CVE-2019-16008
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
26/01/2020
Last modified:
29/01/2020
Description
A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Impact
Base Score 3.x
5.40
Severity 3.x
MEDIUM
Base Score 2.0
3.50
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:* | 11.3\(1\) (excluding) | |
cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:* | 11.3\(1\) (excluding) | |
cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ip_phone_6825_firmware:*:*:*:*:*:*:*:* | 11.3\(1\) (excluding) | |
cpe:2.3:h:cisco:ip_phone_6825:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:* | 11.3\(1\) (excluding) | |
cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:* | 11.3\(1\) (excluding) | |
cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ip_phone_6821_firmware:*:*:*:*:*:*:*:* | 11.3\(1\) (excluding) | |
cpe:2.3:h:cisco:ip_phone_6821:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:* | 11.3\(1\) (excluding) | |
cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:* | 11.3\(1\) (excluding) |
To consult the complete list of CPE names with products and versions, see this page