Low
CVE-2020-3111 (AKA: CDPwn)
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Low
(1 user assessed)High
(1 user assessed)CVE-2020-3111 (AKA: CDPwn)
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
Add Assessment
Ratings
-
Attacker ValueLow
-
ExploitabilityHigh
Technical Analysis
This vulnerability can reportedly only be used to trigger a denial of service condition on VoIP phones, potentially in a wide spread fashion. This would likely disrupt business but would not grant the attacker access to any sensitive information. Business in which affected VoIP phones are used to generate revenue such as commercial and support call centers.
An attacker would need to be on the local area network, directly attached to the vulnerable switch running IOS-XR. This is due to CDP traffic not being forwarded across network boundaries. An attacker leveraging this vulnerability would likely either be physically in the building or have compromised a host which is physically in the building. Successful exploitation would create a denial of service condition..
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- cisco
Products
- ip conference phone 7832 firmware,
- ip conference phone 7832 with multiplatform firmware,
- ip conference phone 8832 firmware,
- ip conference phone 8832 with multiplatform firmware,
- ip phone 6821 firmware,
- ip phone 6841 firmware,
- ip phone 6851 firmware,
- ip phone 6861 firmware,
- ip phone 6871 firmware,
- ip phone 7811 firmware,
- ip phone 7811 with multiplatform firmware,
- ip phone 7821 firmware,
- ip phone 7821 with multiplatform firmware,
- ip phone 7841 firmware,
- ip phone 7841 with multiplatform firmware,
- ip phone 7861 firmware,
- ip phone 7861 with multiplatform firmware,
- ip phone 8811 firmware,
- ip phone 8811 with multiplatform firmware,
- ip phone 8841 firmware,
- ip phone 8841 with multiplatform firmware,
- ip phone 8845 firmware,
- ip phone 8845 with multiplatform firmware,
- ip phone 8851 firmware,
- ip phone 8851 with multiplatform firmware,
- ip phone 8861 firmware,
- ip phone 8861 with multiplatform firmware,
- ip phone 8865 firmware,
- ip phone 8865 with multiplatform firmware,
- unified ip conference phone 8831 firmware,
- unified ip conference phone 8831 for third-party call control firmware -,
- wireless ip phone 8821 firmware,
- wireless ip phone 8821-ex firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: