Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-20445", "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "state": "PUBLISHED", "assignerShortName": "cisco", "dateReserved": "2023-11-08T15:08:07.678Z", "datePublished": "2024-11-06T16:29:06.293Z", "dateUpdated": "2024-11-06T22:00:02.234Z"}, "containers": {"cna": {"title": "Cisco IP Phone 7800, 8800, and 9800 Series Information Disclosure Vulnerability", "metrics": [{"format": "cvssV3_1", "cvssV3_1": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE"}}], "descriptions": [{"lang": "en", "value": "A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 could allow an unauthenticated, remote attacker to access sensitive information on an affected device.\r\n\r\nThis vulnerability is due to improper storage of sensitive information within the web UI of Session Initiation Protocol (SIP)-based phone loads. An attacker could exploit this vulnerability by browsing to the IP address of a device that has Web Access enabled. A successful exploit could allow the attacker to access sensitive information, including incoming and outgoing call records.\r\nNote: Web Access is disabled by default."}], "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-infodisc-sbyqQVbG", "name": "cisco-sa-phone-infodisc-sbyqQVbG"}], "exploits": [{"lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}], "source": {"advisory": "cisco-sa-phone-infodisc-sbyqQVbG", "discovery": "EXTERNAL", "defects": ["CSCwk25862"]}, "problemTypes": [{"descriptions": [{"lang": "en", "description": "Exposure of Sensitive Information to an Unauthorized Actor", "type": "cwe", "cweId": "CWE-200"}]}], "affected": [{"vendor": "Cisco", "product": "Cisco Session Initiation Protocol (SIP) Software", "versions": [{"version": "12.1(1)SR1", "status": "affected"}, {"version": "11.5(1)", "status": "affected"}, {"version": "10.3(2)", "status": "affected"}, {"version": "10.2(2)", "status": "affected"}, {"version": "10.3(1)", "status": "affected"}, {"version": "10.3(1)SR4", "status": "affected"}, {"version": "11.0(1)", "status": "affected"}, {"version": "10.4(1)SR2 3rd Party", "status": "affected"}, {"version": "11.7(1)", "status": "affected"}, {"version": "12.1(1)", "status": "affected"}, {"version": "11.0(0.7) MPP", "status": "affected"}, {"version": "9.3(4) 3rd Party", "status": "affected"}, {"version": "12.5(1)SR2", "status": "affected"}, {"version": "10.2(1)SR1", "status": "affected"}, {"version": "9.3(4)SR3 3rd Party", "status": "affected"}, {"version": "10.2(1)", "status": "affected"}, {"version": "12.5(1)", "status": "affected"}, {"version": "10.3(1)SR2", "status": "affected"}, {"version": "11-0-1MSR1-1", "status": "affected"}, {"version": "10.4(1) 3rd Party", "status": "affected"}, {"version": "12.5(1)SR1", "status": "affected"}, {"version": "11.5(1)SR1", "status": "affected"}, {"version": "10.1(1)SR2", "status": "affected"}, {"version": "12.0(1)SR2", "status": "affected"}, {"version": "12.6(1)", "status": "affected"}, {"version": "10.3(1.11) 3rd Party", "status": "affected"}, {"version": "12.0(1)", "status": "affected"}, {"version": "12.0(1)SR1", "status": "affected"}, {"version": "9.3(3)", "status": "affected"}, {"version": "12.5(1)SR3", "status": "affected"}, {"version": "10.3(1)SR4b", "status": "affected"}, {"version": "9.3(4)SR1 3rd Party", "status": "affected"}, {"version": "10.3(1)SR5", "status": "affected"}, {"version": "10.1(1.9)", "status": "affected"}, {"version": "10.3(1.9) 3rd Party", "status": "affected"}, {"version": "9.3(4)SR2 3rd Party", "status": "affected"}, {"version": "10.3(1)SR1", "status": "affected"}, {"version": "10.3(1)SR3", "status": "affected"}, {"version": "10.1(1)SR1", "status": "affected"}, {"version": "12.0(1)SR3", "status": "affected"}, {"version": "12.6(1)SR1", "status": "affected"}, {"version": "12.7(1)", "status": "affected"}, {"version": "10.3(1)SR6", "status": "affected"}, {"version": "12.8(1)", "status": "affected"}, {"version": "12.7(1)SR1", "status": "affected"}, {"version": "12.8(1)SR1", "status": "affected"}, {"version": "12.8(1)SR2", "status": "affected"}, {"version": "14.0(1)", "status": "affected"}, {"version": "14.0(1)SR1", "status": "affected"}, {"version": "10.3(1)SR7", "status": "affected"}, {"version": "14.0(1)SR2", "status": "affected"}, {"version": "14.1(1)", "status": "affected"}, {"version": "14.0(1)SR3", "status": "affected"}, {"version": "14.1(1)SR1", "status": "affected"}, {"version": "14.1(1)SR2", "status": "affected"}, {"version": "14.2(1)", "status": "affected"}, {"version": "14.2(1)SR1", "status": "affected"}, {"version": "14.1(1)SR3", "status": "affected"}, {"version": "14.2(1)SR2", "status": "affected"}, {"version": "3.1(1)", "status": "affected"}, {"version": "3.0(1)", "status": "affected"}, {"version": "14.2(1)SR3", "status": "affected"}, {"version": "3.1(1)SR1", "status": "affected"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco", "dateUpdated": "2024-11-06T16:29:06.293Z"}}, "adp": [{"affected": [{"vendor": "cisco", "product": "sip_ip_phone_software", "cpes": ["cpe:2.3:a:cisco:sip_ip_phone_software:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "12.1(1)SR1", "status": "affected"}, {"version": "11.5(1)", "status": "affected"}, {"version": "10.3(2)", "status": "affected"}, {"version": "10.2(2)", "status": "affected"}, {"version": "10.3(1)", "status": "affected"}, {"version": "10.3(1)SR4", "status": "affected"}, {"version": "11.0(1)", "status": "affected"}, {"version": "10.4(1)SR2_3rd_Party", "status": "affected"}, {"version": "11.7(1)", "status": "affected"}, {"version": "12.1(1)", "status": "affected"}, {"version": "11.0(0.7)_MPP", "status": "affected"}, {"version": "9.3(4)_3rd_Party", "status": "affected"}, {"version": "12.5(1)SR2", "status": "affected"}, {"version": "10.2(1)SR1", "status": "affected"}, {"version": "9.3(4)SR3_3rd_Party", "status": "affected"}, {"version": "10.2(1)", "status": "affected"}, {"version": "12.5(1)", "status": "affected"}, {"version": "10.3(1)SR2", "status": "affected"}, {"version": "11-0-1MSR1-1", "status": "affected"}, {"version": "10.4(1)_3rd_Party", "status": "affected"}, {"version": "12.5(1)SR1", "status": "affected"}, {"version": "11.5(1)SR1", "status": "affected"}, {"version": "10.1(1)SR2", "status": "affected"}, {"version": "12.0(1)SR2", "status": "affected"}, {"version": "12.6(1)", "status": "affected"}, {"version": "10.3(1.11)_3rd_Party", "status": "affected"}, {"version": "12.0(1)", "status": "affected"}, {"version": "12.0(1)SR1", "status": "affected"}, {"version": "9.3(3)", "status": "affected"}, {"version": "12.5(1)SR3", "status": "affected"}, {"version": "10.3(1)SR4b", "status": "affected"}, {"version": "9.3(4)SR1_3rd_Party", "status": "affected"}, {"version": "10.3(1)SR5", "status": "affected"}, {"version": "10.1(1.9)", "status": "affected"}, {"version": "10.3(1.9)_3rd_Party", "status": "affected"}, {"version": "9.3(4)SR2_3rd_Party", "status": "affected"}, {"version": "10.3(1)SR1", "status": "affected"}, {"version": "10.3(1)SR3", "status": "affected"}, {"version": "10.1(1)SR1", "status": "affected"}, {"version": "12.0(1)SR3", "status": "affected"}, {"version": "12.6(1)SR1", "status": "affected"}, {"version": "12.7(1)", "status": "affected"}, {"version": "10.3(1)SR6", "status": "affected"}, {"version": "12.8(1)", "status": "affected"}, {"version": "12.7(1)SR1", "status": "affected"}, {"version": "12.8(1)SR1", "status": "affected"}, {"version": "12.8(1)SR2", "status": "affected"}, {"version": "14.0(1)", "status": "affected"}, {"version": "14.0(1)SR1", "status": "affected"}, {"version": "10.3(1)SR7", "status": "affected"}, {"version": "14.0(1)SR2", "status": "affected"}, {"version": "14.1(1)", "status": "affected"}, {"version": "14.0(1)SR3", "status": "affected"}, {"version": "14.1(1)SR1", "status": "affected"}, {"version": "14.1(1)SR2", "status": "affected"}, {"version": "14.2(1)", "status": "affected"}, {"version": "14.2(1)SR1", "status": "affected"}, {"version": "14.1(1)SR3", "status": "affected"}, {"version": "14.2(1)SR2", "status": "affected"}, {"version": "3.1(1)", "status": "affected"}, {"version": "3.0(1)", "status": "affected"}, {"version": "14.2(1)SR3", "status": "affected"}, {"version": "3.1(1)SR1", "status": "affected"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-11-06T17:23:46.067108Z", "id": "CVE-2024-20445", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-11-06T22:00:02.234Z"}}]}}