A vulnerability in Cisco SIP IP Phone Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone. The vulnerability is due to insufficient validation of input Session Initiation Protocol (SIP) packets. An attacker could exploit this vulnerability by altering the SIP replies that are sent to the affected phone during the registration process. A successful exploit could allow the attacker to cause the phone to reboot and not complete the registration process.

Project Subscriptions

Vendors Products
Ip Conference Phone 7832 Subscribe
Ip Conference Phone 7832 Firmware Subscribe
Ip Conference Phone 8832 Subscribe
Ip Conference Phone 8832 Firmware Subscribe
Ip Phone 7811 Subscribe
Ip Phone 7811 Firmware Subscribe
Ip Phone 7821 Subscribe
Ip Phone 7821 Firmware Subscribe
Ip Phone 7841 Subscribe
Ip Phone 7841 Firmware Subscribe
Ip Phone 7861 Subscribe
Ip Phone 7861 Firmware Subscribe
Ip Phone 8811 Subscribe
Ip Phone 8811 Firmware Subscribe
Ip Phone 8841 Subscribe
Ip Phone 8841 Firmware Subscribe
Ip Phone 8845 Subscribe
Ip Phone 8845 Firmware Subscribe
Ip Phone 8851 Subscribe
Ip Phone 8851 Firmware Subscribe
Ip Phone 8861 Subscribe
Ip Phone 8861 Firmware Subscribe
Ip Phone 8865 Subscribe
Ip Phone 8865 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-10479 A vulnerability in Cisco SIP IP Phone Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone. The vulnerability is due to insufficient validation of input Session Initiation Protocol (SIP) packets. An attacker could exploit this vulnerability by altering the SIP replies that are sent to the affected phone during the registration process. A successful exploit could allow the attacker to cause the phone to reboot and not complete the registration process.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 21 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-21T19:19:37.597Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1922

cve-icon Vulnrichment

Updated: 2024-08-04T18:35:51.285Z

cve-icon NVD

Status : Modified

Published: 2019-07-06T02:15:11.793

Modified: 2024-11-21T04:37:41.573

Link: CVE-2019-1922

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses