CVE-2022-20817
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/06/2022
Last modified:
07/11/2023
Description
A vulnerability in Cisco Unified IP Phones could allow an unauthenticated, remote attacker to impersonate another user's phone if the Cisco Unified Communications Manager (CUCM) is in secure mode. This vulnerability is due to improper key generation during the manufacturing process that could result in duplicated manufactured keys installed on multiple devices. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on the secure communication between the phone and the CUCM. A successful exploit could allow the attacker to impersonate another user's phone. This vulnerability cannot be addressed with software updates. There is a workaround that addresses this vulnerability.
Impact
Base Score 3.x
7.40
Severity 3.x
HIGH
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:h:cisco:unified_ip_phone_6911:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:unified_ip_phone_6911_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:unified_ip_phone_6921:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:unified_ip_phone_6921_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:unified_ip_phone_6941:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:unified_ip_phone_6941_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:unified_ip_phone_6945:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:unified_ip_phone_6945_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:unified_ip_phone_6961:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:unified_ip_phone_6961_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:unified_ip_phone_8941:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:unified_ip_phone_8941_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:unified_ip_phone_8945:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:unified_ip_phone_8945_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:unified_ip_phone_8961:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



