The web-based management (WBM) interface in Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 generates session cookies with insufficient entropy, which makes it easier for remote attackers to hijack sessions via a brute-force attack.
References
Link | Resource |
---|---|
https://networks.unify.com/security/advisories/OBSO-1501-02.pdf | Mitigation Vendor Advisory |
https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt | Third Party Advisory |
https://networks.unify.com/security/advisories/OBSO-1501-02.pdf | Mitigation Vendor Advisory |
https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://networks.unify.com/security/advisories/OBSO-1501-02.pdf - Mitigation, Vendor Advisory | |
References | () https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt - Third Party Advisory |
Information
Published : 2018-04-12 21:29
Updated : 2024-11-21 02:19
NVD link : CVE-2014-8422
Mitre link : CVE-2014-8422
CVE.ORG link : CVE-2014-8422
JSON object : View
Products Affected
atos
- openscape_desk_phone_ip_35g_eco
- openscape_desk_phone_ip_55g
- openscape_desk_phone_ip_35g
unify
- openstage_40
- openscape_desk_phone_ip_sip
- openstage_sip
- openstage_20
- openstage_60
CWE
CWE-331
Insufficient Entropy