CVE-2022-20774
Severity CVSS v4.0:
Pending analysis
Type:
CWE-352
Cross-Site Request Forgery (CSRF)
Publication date:
06/04/2022
Last modified:
07/11/2023
Description
A vulnerability in the web-based management interface of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web-based interface of an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform configuration changes on the affected device, resulting in a denial of service (DoS) condition.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Base Score 2.0
4.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:ip_phone_6871_firmware:*:*:*:*:*:*:*:* | 11.3.5 (excluding) | |
| cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ip_phone_6861_firmware:*:*:*:*:*:*:*:* | 11.3.5 (excluding) | |
| cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ip_phone_6851_firmware:*:*:*:*:*:*:*:* | 11.3.5 (excluding) | |
| cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ip_phone_6841_firmware:*:*:*:*:*:*:*:* | 11.3.5 (excluding) | |
| cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ip_phone_6825_firmware:*:*:*:*:*:*:*:* | 11.3.5 (excluding) | |
| cpe:2.3:h:cisco:ip_phone_6825:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:* | 11.3.5 (excluding) | |
| cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:* | 11.3.5 (excluding) | |
| cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



