7.4
CVE-2022-20817
- EPSS 0.89%
- Published 15.06.2022 18:15:08
- Last modified 21.11.2024 06:43:36
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in Cisco Unified IP Phones could allow an unauthenticated, remote attacker to impersonate another user's phone if the Cisco Unified Communications Manager (CUCM) is in secure mode. This vulnerability is due to improper key generation during the manufacturing process that could result in duplicated manufactured keys installed on multiple devices. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on the secure communication between the phone and the CUCM. A successful exploit could allow the attacker to impersonate another user's phone. This vulnerability cannot be addressed with software updates. There is a workaround that addresses this vulnerability.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Unified Ip Phone 6911 Firmware Version-
Cisco ≫ Unified Ip Phone 6921 Firmware Version-
Cisco ≫ Unified Ip Phone 6941 Firmware Version-
Cisco ≫ Unified Ip Phone 6945 Firmware Version-
Cisco ≫ Unified Ip Phone 6961 Firmware Version-
Cisco ≫ Unified Ip Phone 8941 Firmware Version-
Cisco ≫ Unified Ip Phone 8945 Firmware Version-
Cisco ≫ Unified Ip Phone 8961 Firmware Version-
Cisco ≫ Unified Ip Phone 9951 Firmware Version-
Cisco ≫ Unified Ip Phone 9971 Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.89% | 0.746 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.4 | 2.2 | 5.2 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
|
nvd@nist.gov | 4 | 4.9 | 4.9 |
AV:N/AC:H/Au:N/C:P/I:P/A:N
|
psirt@cisco.com | 7.4 | 2.2 | 5.2 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
|
CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.