Cisco IP Conference Phone 7832 With Multiplatform Firmware 11.1.1

CPE Details

Cisco IP Conference Phone 7832 With Multiplatform Firmware 11.1.1
11.1.1
2023-08-25
12h54 +00:00
2023-08-25
13h41 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:11.1.1:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

ip_conference_phone_7832_with_multiplatform_firmware

Version

11.1.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-20221 2023-08-16 21h01 +00:00 A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based management interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform a factory reset of the affected device, resulting in a Denial of Service (DoS) condition.
6.5
Moyen
CVE-2020-3111 2020-02-05 17h40 +00:00 A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
8.8
Haute