CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X
-
A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device.
This vulnerability is due to unencrypted storage of confidential information on an affected device. An attacker could exploit this vulnerability by physically extracting and accessing one of the flash memory chips. A successful exploit could allow the attacker to obtain confidential information from the device, which could be used for subsequent attacks.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-info-disc-fRdJfOxA
-
Vulnerable Products
At the time of publication, this vulnerability affected the following Cisco products if they were running a vulnerable firmware release:
- IP Conference Phone 7832
- IP Conference Phone 8832
- IP Phones 7811, 7821, 7841, and 7861
- IP Phones 8811, 8841, 8845, 8851, 8861, and 8865
- Unified IP Conference Phone 8831
- Unified IP Conference Phone 8831 for Third-Party Call Control
- Unified IP Phones 7945G, 7965G, and 7975G
- Unified SIP Phone 3905
- Wireless IP Phones 8821 and 8821-EX
For information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the following Cisco products:
- ATA 190, 191, 192 Analog Telephone Adapters
- IP Conference Phone 7832 with Multiplatform Firmware
- IP Conference Phone 8832 with Multiplatform Firmware
- IP DECT 110 Repeater
- IP DECT 110 Repeater with Multiplatform Firmware
- IP Phone DECT 6800 Series with Multiplatform Firmware
- IP Phones 6821, 6841, 6851, 6861, and 6871 with Multiplatform Firmware
- IP Phones 7811, 7821, 7841, and 7861 with Multiplatform Firmware
- IP Phones 8811, 8841, 8845, 8851, 8861, and 8865 with Multiplatform Firmware
- Unified IP Phones 6901 and 6911
- Webex Desk Series devices
- Webex Room Phone
- Webex Share devices
- Webex Wireless Phones 840 and 860
-
There are no workarounds that address this vulnerability.
-
When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page, to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Fixed Releases
At the time of publication, the release information in the following table(s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.
The left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability described in this advisory and which release included the fix for this vulnerability.
Cisco Product Cisco Bug ID First Fixed Release IP Conference Phone 7832
IP Conference Phone 8832
IP Phones 7811, 7821, 7841, and 7861
IP Phones 8811, 8841,8845, 8851, 8861, and 8865CSCvy39057 14.1(1) Unified IP Conference Phone 8831
Unified IP Conference Phone 8831 for Third-Party Call ControlCSCvy39054 End of software maintenance. No fix available. See the next section. Unified IP Phones 7945G, 7965G, and 7975G CSCvy39059 End of software maintenance. No fix available. See the next section. Unified SIP Phone 3905 CSCvy39055 9.4(1)SR5 Wireless IP Phones 8821 and 8821-EX CSCvy39058 11.0(6)SR2 Unified IP Conference Phone 8831 and 8831 for Third-Party Call Control and Unified IP Phones 7945G, 7965G, and 7975G
Cisco has not released and will not release firmware updates to address the vulnerability described in this advisory. The Cisco Unified IP Conference Phone 8831 and 8831 for Third-Party Call Control as well as Cisco Unified IP Phones 7945G, 7965G, and 7975G have entered the end-of-life process. Customers are advised to refer to the end-of-life notices for these products:
End-of-Sale and End-of-Life Announcement for the Cisco IP Conference Phone 8831 for on-premise and accessories
End-of-Sale and End-of-Life Announcement for the Cisco IP Conference Phone 8831 for Multiplatform Phones and Accessories
End-of-Sale and End-of-Life Announcement for the Cisco Unified IP Phones 7945, 7965, 7975 and 7916Customers are encouraged to migrate to the products listed in the end-of-life notices.
When considering a device migration, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page, to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the new device will be sufficient for their network needs, the new devices contain sufficient memory, and that current hardware and software configurations will continue to be supported properly by the new product. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.
-
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
-
Cisco would like to thank Gerhard Hechenberger and Steffen Robertz of the SEC Consult Vulnerability Lab for reporting this vulnerability.
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
Version Description Section Status Date 1.0 Initial public release. — Final 2022-JAN-12
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.