- EPSS 1%
- Veröffentlicht 13.09.2004 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
application.cgi in the Pingtel Xpressa handset running firmware 2.1.11.24 allows remote authenticated users to cause a denial of service (VxWorks OS crash) via a long HTTP GET request, possibly triggering a buffer overflow.
- EPSS 0.44%
- Veröffentlicht 19.02.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows administrators to cause a denial of service by modifying the SIP_AUTHENTICATE_SCHEME value to force authentication of incoming calls, which does not noti...
- EPSS 0.6%
- Veröffentlicht 31.12.2002 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 2.0.1 leaks sensitive information during boot-up, which allows attackers to obtain the MD5 hash of the Admin password, MD5 hash of the physical password, and other registration information.
- EPSS 0.63%
- Veröffentlicht 31.12.2002 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Pingtel Xpressa 1.2.5 through 2.0.1 uses predictable (1) Call-ID, (2) CSeq, and (3) "To" and "From" SIP URL values in a Session Identification Protocol (SIP) request, which allows remote attackers to avoid registering with the SIP registrar.
- EPSS 2.2%
- Veröffentlicht 23.07.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 has a default null administrator password, which could allow remote attackers to gain access to the phone.
CVE-2002-0668
- EPSS 0.49%
- Veröffentlicht 23.07.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows authenticated users to modify the Call Forwarding settings and hijack calls.
CVE-2002-0670
- EPSS 1.26%
- Veröffentlicht 23.07.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The web interface for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 uses Base64 encoded usernames and passwords for HTTP basic authentication, which allows remote attackers to steal and easily decode the passwords via sniffing.
CVE-2002-0672
- EPSS 0.16%
- Veröffentlicht 23.07.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows attackers with physical access to restore the phone to factory defaults without authentication via a menu option, which sets the administrator password to null.
CVE-2002-0673
- EPSS 0.16%
- Veröffentlicht 23.07.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The enrollment process for Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 allows attackers with physical access to the phone to log out the current user and re-register the phone using MyPingtel Sign-In to gain remote access and ...
CVE-2002-0674
- EPSS 0.07%
- Veröffentlicht 23.07.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 does not "time out" an inactive administrator session, which could allow other users to perform administrator actions if the administrator does not explicitly end the authentication.