Cisco

Ip Phone 8832 Firmware

10 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 10.83%
  • Published 03.03.2023 16:15:10
  • Last modified 21.11.2024 07:40:30

Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnera...

  • EPSS 8.61%
  • Published 03.03.2023 16:15:10
  • Last modified 21.11.2024 07:40:30

Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnera...

  • EPSS 0.08%
  • Published 20.01.2023 07:15:13
  • Last modified 21.11.2024 07:40:21

A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device. This vulnerability is due to insufficient validatio...

  • EPSS 3.9%
  • Published 12.12.2022 09:15:12
  • Last modified 21.11.2024 06:43:56

A vulnerability in the Cisco Discovery Protocol processing feature of Cisco IP Phone 7800 and 8800 Series firmware could allow an unauthenticated, adjacent attacker to cause a stack overflow on an affected device. This vulnerability is due to insu...

  • EPSS 0.25%
  • Published 06.04.2022 19:15:08
  • Last modified 21.11.2024 06:43:31

A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of th...

Exploit
  • EPSS 0.3%
  • Published 11.05.2021 20:15:08
  • Last modified 21.11.2024 05:15:05

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragmen...

Exploit
  • EPSS 0.56%
  • Published 11.05.2021 20:15:08
  • Last modified 21.11.2024 05:15:05

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP...

  • EPSS 0.41%
  • Published 11.05.2021 20:15:08
  • Last modified 21.11.2024 05:19:20

An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denia...

  • EPSS 0.43%
  • Published 11.05.2021 20:15:08
  • Last modified 21.11.2024 05:19:20

An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent...

  • EPSS 0.29%
  • Published 26.01.2020 05:15:14
  • Last modified 21.11.2024 04:29:55

A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of a...