CRLF injection vulnerability in the web-based management (WBM) interface in Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 allows remote authenticated users to modify the root password and consequently access the debug port using the serial interface via the ssh-password parameter to page.cmd.
References
Link | Resource |
---|---|
https://networks.unify.com/security/advisories/OBSO-1501-02.pdf | Vendor Advisory |
https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt | Third Party Advisory |
https://networks.unify.com/security/advisories/OBSO-1501-02.pdf | Vendor Advisory |
https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 02:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://networks.unify.com/security/advisories/OBSO-1501-02.pdf - Vendor Advisory | |
References | () https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt - Third Party Advisory |
Information
Published : 2018-04-12 21:29
Updated : 2024-11-21 02:21
NVD link : CVE-2014-9563
Mitre link : CVE-2014-9563
CVE.ORG link : CVE-2014-9563
JSON object : View
Products Affected
atos
- openscape_desk_phone_ip_35g_eco
- openscape_desk_phone_ip_55g
- openscape_desk_phone_ip_35g
unify
- openstage_40
- openscape_desk_phone_ip_sip
- openstage_sip
- openstage_20
- openstage_60
CWE
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')