Pingtel

Xpressa

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1%
  • Veröffentlicht 13.09.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

application.cgi in the Pingtel Xpressa handset running firmware 2.1.11.24 allows remote authenticated users to cause a denial of service (VxWorks OS crash) via a long HTTP GET request, possibly triggering a buffer overflow.

  • EPSS 0.44%
  • Veröffentlicht 19.02.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows administrators to cause a denial of service by modifying the SIP_AUTHENTICATE_SCHEME value to force authentication of incoming calls, which does not noti...

  • EPSS 0.6%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 2.0.1 leaks sensitive information during boot-up, which allows attackers to obtain the MD5 hash of the Admin password, MD5 hash of the physical password, and other registration information.

  • EPSS 0.63%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Pingtel Xpressa 1.2.5 through 2.0.1 uses predictable (1) Call-ID, (2) CSeq, and (3) "To" and "From" SIP URL values in a Session Identification Protocol (SIP) request, which allows remote attackers to avoid registering with the SIP registrar.

  • EPSS 2.2%
  • Veröffentlicht 23.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 has a default null administrator password, which could allow remote attackers to gain access to the phone.

  • EPSS 0.49%
  • Veröffentlicht 23.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows authenticated users to modify the Call Forwarding settings and hijack calls.

  • EPSS 1.26%
  • Veröffentlicht 23.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 uses Base64 encoded usernames and passwords for HTTP basic authentication, which allows remote attackers to steal and easily decode the passwords via sniffing.

  • EPSS 0.16%
  • Veröffentlicht 23.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows attackers with physical access to restore the phone to factory defaults without authentication via a menu option, which sets the administrator password to null.

  • EPSS 0.16%
  • Veröffentlicht 23.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The enrollment process for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows attackers with physical access to the phone to log out the current user and re-register the phone using MyPingtel Sign-In to gain remote access and ...

  • EPSS 0.07%
  • Veröffentlicht 23.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 does not "time out" an inactive administrator session, which could allow other users to perform administrator actions if the administrator does not explicitly end the authentication.