The TFTP implementation on Cisco Small Business SPA30x, SPA50x, SPA51x phones 7.5.7 improperly validates firmware-image file integrity, which allows local users to load a Trojan horse image by leveraging shell access, aka Bug ID CSCut67400.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 02:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ipp - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/78739 - | |
References | () http://www.securitytracker.com/id/1034376 - |
Information
Published : 2015-12-15 05:59
Updated : 2024-11-21 02:34
NVD link : CVE-2015-6403
Mitre link : CVE-2015-6403
CVE.ORG link : CVE-2015-6403
JSON object : View
Products Affected
cisco
- spa_501g
- spa_504g
- spa_500s
- spa_508g
- spa_301
- spa_500ds
- spa_512g
- spa_514g
- spa500_firmware
- spa300_firmware
- spa_502g
- spa_303
- spa_525g2
- spa_509g
CWE
CWE-20
Improper Input Validation