CVE-2015-6403

The TFTP implementation on Cisco Small Business SPA30x, SPA50x, SPA51x phones 7.5.7 improperly validates firmware-image file integrity, which allows local users to load a Trojan horse image by leveraging shell access, aka Bug ID CSCut67400.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:spa500_firmware:7.5.7:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:spa_500ds:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:spa_500s:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:spa_501g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:spa_502g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:spa_504g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:spa_508g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:spa_509g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:spa_512g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:spa_514g:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:spa_525g2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:spa300_firmware:7.5.7:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:spa_301:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:spa_303:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:34

Type Values Removed Values Added
References () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ipp - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ipp - Vendor Advisory
References () http://www.securityfocus.com/bid/78739 - () http://www.securityfocus.com/bid/78739 -
References () http://www.securitytracker.com/id/1034376 - () http://www.securitytracker.com/id/1034376 -

Information

Published : 2015-12-15 05:59

Updated : 2024-11-21 02:34


NVD link : CVE-2015-6403

Mitre link : CVE-2015-6403

CVE.ORG link : CVE-2015-6403


JSON object : View

Products Affected

cisco

  • spa_501g
  • spa_504g
  • spa_500s
  • spa_508g
  • spa_301
  • spa_500ds
  • spa_512g
  • spa_514g
  • spa500_firmware
  • spa300_firmware
  • spa_502g
  • spa_303
  • spa_525g2
  • spa_509g
CWE
CWE-20

Improper Input Validation