CVE-2020-3111

A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:cisco:ip_phone_6821_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_6821:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
OR cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
OR cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
OR cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
OR cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
OR cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
OR cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
OR cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
OR cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
OR cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
OR cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:unified_ip_conference_phone_8831:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:cisco:unified_ip_conference_phone_8831_for_third-party_call_control_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:unified_ip_conference_phone_8831_for_third-party_call_control:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:wireless_ip_phone_8821-ex:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:30

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/156203/Cisco-Discovery-Protocol-CDP-Remote-Device-Takeover.html - Third Party Advisory, VDB Entry
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos - Vendor Advisory

Information

Published : 2020-02-05 18:15

Updated : 2024-11-21 05:30


NVD link : CVE-2020-3111

Mitre link : CVE-2020-3111

CVE.ORG link : CVE-2020-3111


JSON object : View

Products Affected

cisco

  • ip_phone_8841_with_multiplatform_firmware
  • ip_phone_6821
  • ip_phone_6851_firmware
  • ip_phone_7821
  • ip_phone_6871
  • ip_phone_8851_firmware
  • ip_phone_8811_firmware
  • ip_phone_7841
  • ip_conference_phone_8832
  • wireless_ip_phone_8821_firmware
  • ip_phone_8861_firmware
  • ip_conference_phone_7832_firmware
  • ip_conference_phone_7832
  • wireless_ip_phone_8821-ex_firmware
  • ip_phone_8865_firmware
  • unified_ip_conference_phone_8831_firmware
  • ip_phone_7821_with_multiplatform_firmware
  • ip_phone_8845_with_multiplatform_firmware
  • ip_phone_7861_firmware
  • wireless_ip_phone_8821
  • ip_phone_8841_firmware
  • ip_phone_7861_with_multiplatform_firmware
  • ip_phone_7811_firmware
  • ip_phone_6841_firmware
  • ip_phone_7841_firmware
  • ip_phone_8861_with_multiplatform_firmware
  • ip_phone_6841
  • ip_conference_phone_8832_firmware
  • ip_phone_8845_firmware
  • ip_conference_phone_8832_with_multiplatform_firmware
  • ip_phone_8841
  • ip_phone_8851_with_multiplatform_firmware
  • ip_phone_6861
  • ip_phone_6861_firmware
  • ip_phone_8811_with_multiplatform_firmware
  • ip_phone_6821_firmware
  • ip_phone_8851
  • ip_phone_6851
  • ip_phone_6871_firmware
  • ip_conference_phone_7832_with_multiplatform_firmware
  • unified_ip_conference_phone_8831_for_third-party_call_control_firmware
  • ip_phone_8861
  • unified_ip_conference_phone_8831_for_third-party_call_control
  • ip_phone_7821_firmware
  • ip_phone_7811_with_multiplatform_firmware
  • ip_phone_8845
  • ip_phone_7811
  • wireless_ip_phone_8821-ex
  • unified_ip_conference_phone_8831
  • ip_phone_8865_with_multiplatform_firmware
  • ip_phone_7861
  • ip_phone_8865
  • ip_phone_8811
  • ip_phone_7841_with_multiplatform_firmware
CWE
CWE-20

Improper Input Validation