Unknown
CVE-2022-20660
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-20660
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device. This vulnerability is due to unencrypted storage of confidential information on an affected device. An attacker could exploit this vulnerability by physically extracting and accessing one of the flash memory chips. A successful exploit could allow the attacker to obtain confidential information from the device, which could be used for subsequent attacks.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- ip conference phone 7832 firmware,
- ip conference phone 8832 firmware,
- ip phone 7811 firmware,
- ip phone 7821 firmware,
- ip phone 7841 firmware,
- ip phone 7861 firmware,
- ip phone 8811 firmware,
- ip phone 8841 firmware,
- ip phone 8845 firmware,
- ip phone 8851 firmware,
- ip phone 8861 firmware,
- ip phone 8865 firmware,
- unified ip conference phone 8831 firmware -,
- unified ip conference phone 8831 for third-party call control firmware -,
- unified ip phone 7945g firmware -,
- unified ip phone 7965g firmware -,
- unified ip phone 7975g firmware -,
- unified sip phone 3905 firmware,
- wireless ip phone 8821 firmware,
- wireless ip phone 8821-ex firmware
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: