Cisco

Ip Phone 8865 Firmware

23 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.09%
  • Veröffentlicht 14.01.2022 05:15:11
  • Zuletzt bearbeitet 21.11.2024 06:43:15

A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device. This vulnerability is due to unencrypted storage of...

  • EPSS 0.07%
  • Veröffentlicht 06.10.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 06:11:01

A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerab...

  • EPSS 0.13%
  • Veröffentlicht 22.07.2021 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:08:54

The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitrary code execution in the TrustZone Trusted Execution Environment (TEE) of an affected device. This,...

  • EPSS 0.32%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:19:20

An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt ...

  • EPSS 0.18%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:19:20

An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent...

  • EPSS 0.41%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:19:20

An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denia...

Exploit
  • EPSS 0.51%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:15:05

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 11.05.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:15:05

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragmen...

  • EPSS 0.23%
  • Veröffentlicht 05.02.2020 18:15:10
  • Zuletzt bearbeitet 21.11.2024 05:30:20

A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due ...

  • EPSS 0.29%
  • Veröffentlicht 26.01.2020 05:15:14
  • Zuletzt bearbeitet 21.11.2024 04:29:55

A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of a...