A vulnerability in Cisco SIP IP Phone Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone. The vulnerability is due to insufficient validation of input Session Initiation Protocol (SIP) packets. An attacker could exploit this vulnerability by altering the SIP replies that are sent to the affected phone during the registration process. A successful exploit could allow the attacker to cause the phone to reboot and not complete the registration process.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Ip Conference Phone 7832
Subscribe
Ip Conference Phone 7832 Firmware
Subscribe
Ip Conference Phone 8832
Subscribe
Ip Conference Phone 8832 Firmware
Subscribe
Ip Phone 7811
Subscribe
Ip Phone 7811 Firmware
Subscribe
Ip Phone 7821
Subscribe
Ip Phone 7821 Firmware
Subscribe
Ip Phone 7841
Subscribe
Ip Phone 7841 Firmware
Subscribe
Ip Phone 7861
Subscribe
Ip Phone 7861 Firmware
Subscribe
Ip Phone 8811
Subscribe
Ip Phone 8811 Firmware
Subscribe
Ip Phone 8841
Subscribe
Ip Phone 8841 Firmware
Subscribe
Ip Phone 8845
Subscribe
Ip Phone 8845 Firmware
Subscribe
Ip Phone 8851
Subscribe
Ip Phone 8851 Firmware
Subscribe
Ip Phone 8861
Subscribe
Ip Phone 8861 Firmware
Subscribe
Ip Phone 8865
Subscribe
Ip Phone 8865 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-10479 | A vulnerability in Cisco SIP IP Phone Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected phone. The vulnerability is due to insufficient validation of input Session Initiation Protocol (SIP) packets. An attacker could exploit this vulnerability by altering the SIP replies that are sent to the affected phone during the registration process. A successful exploit could allow the attacker to cause the phone to reboot and not complete the registration process. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 21 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-21T19:19:37.597Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1922
Updated: 2024-08-04T18:35:51.285Z
Status : Modified
Published: 2019-07-06T02:15:11.793
Modified: 2024-11-21T04:37:41.573
Link: CVE-2019-1922
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD