mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
59 lines
2.4 KiB
JSON
59 lines
2.4 KiB
JSON
{
|
|
"id": "CVE-2024-20357",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2024-05-01T17:15:28.143",
|
|
"lastModified": "2024-05-01T19:50:25.633",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in the XML service of Cisco IP Phone firmware could allow an unauthenticated, remote attacker to initiate phone calls on an affected device. \r\n\r This vulnerability exists because bounds-checking does not occur while parsing XML requests. An attacker could exploit this vulnerability by sending a crafted XML request to an affected device. A successful exploit could allow the attacker to initiate calls or play sounds on the device."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en el servicio XML del firmware del tel\u00e9fono IP de Cisco podr\u00eda permitir que un atacante remoto no autenticado inicie llamadas telef\u00f3nicas en un dispositivo afectado. Esta vulnerabilidad existe porque la verificaci\u00f3n de los l\u00edmites no se produce al analizar solicitudes XML. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud XML manipulada a un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante iniciar llamadas o reproducir sonidos en el dispositivo."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.9,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.2,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-787"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-multi-vulns-cXAhCvS",
|
|
"source": "ykramarz@cisco.com"
|
|
}
|
|
]
|
|
} |