mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
60 lines
2.8 KiB
JSON
60 lines
2.8 KiB
JSON
{
|
|
"id": "CVE-2024-20378",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2024-05-01T17:15:28.660",
|
|
"lastModified": "2024-05-01T19:50:25.633",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in the web-based management interface of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device. \r\n\r This vulnerability is due to a lack of authentication for specific endpoints of the web-based management interface on an affected device. An attacker could exploit this vulnerability by connecting to the affected device. A successful exploit could allow the attacker to gain unauthorized access to the device, enabling the recording of user credentials and traffic to and from the affected device, including VoIP calls that could be replayed."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web del firmware del tel\u00e9fono IP de Cisco podr\u00eda permitir que un atacante remoto no autenticado recupere informaci\u00f3n confidencial de un dispositivo afectado. Esta vulnerabilidad se debe a la falta de autenticaci\u00f3n para endpoints espec\u00edficos de la interfaz de administraci\u00f3n basada en web en un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad conect\u00e1ndose al dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante obtener acceso no autorizado al dispositivo, lo que permitir\u00eda registrar las credenciales del usuario y el tr\u00e1fico hacia y desde el dispositivo afectado, incluidas las llamadas VoIP que podr\u00edan reproducirse."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-305"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |