Vulnerability Details : CVE-2023-20018
A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication.
Products affected by CVE-2023-20018
- cpe:2.3:o:cisco:ip_phone_8800_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_7800_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_8821_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_7832_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_8831_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phone_8832_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:unified_ip_phone_8851nr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:unified_ip_phone_8865nr_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ip_phones_8832_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-20018
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 45 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-20018
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
3.9
|
2.5
|
NIST | |
8.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H |
3.9
|
4.7
|
Cisco Systems, Inc. |
CWE ids for CVE-2023-20018
-
The product requires authentication, but the product has an alternate path or channel that does not require authentication.Assigned by: ykramarz@cisco.com (Secondary)
-
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-20018
-
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR
Cisco IP Phone 7800 and 8800 Series Web Management Interface Authentication Bypass VulnerabilityVendor Advisory
Jump to