Cisco

Ip Phone 8861 Firmware

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.25%
  • Veröffentlicht 06.04.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:43:31

A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of th...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 14.01.2022 05:15:11
  • Zuletzt bearbeitet 21.11.2024 06:43:15

A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device. This vulnerability is due to unencrypted storage of...

  • EPSS 0.07%
  • Veröffentlicht 06.10.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 06:11:01

A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerab...

  • EPSS 0.13%
  • Veröffentlicht 22.07.2021 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:08:54

The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitrary code execution in the TrustZone Trusted Execution Environment (TEE) of an affected device. This,...

  • EPSS 0.32%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:19:20

An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt ...

  • EPSS 0.18%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:19:20

An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent...

  • EPSS 0.41%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:19:20

An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denia...

Exploit
  • EPSS 0.51%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:15:05

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:15:05

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragmen...

  • EPSS 3.18%
  • Veröffentlicht 06.11.2020 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:31:20

A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload. The vulnerability is ...