CVE-2014-2651
high-risk
Published 2020-01-09
Unify OpenStage/OpenScape Desk Phone IP SIP before V3 R3.11.0 has an authentication bypass in the default mode of the Workpoint Interface
Do I need to act?
-
0.40% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (14)
Openstage 80 Firmware
Openstage 80 G Firmware
Openstage 60 G Firmware
Openstage 60 Firmware
Openstage 40 Firmware
Openstage 40 G Firmware
Openstage 20 E Firmware
Openstage 20 Firmware
Openstage 20 G Firmware
Openstage 15 Firmware
Openstage 15 G Firmware
Openscape Desk Phone Ip 35G Firmware
Openscape Desk Phone Ip 35G Eco Firmware
Openscape Desk Phone Ip 55G Firmware
Affected Vendors
References (4)
Third Party Advisory
http://assets.yourcircuit.com/Internet/web/Container%20Site/Misc/Footer-content/...
Vendor Advisory
https://networks.unify.com/security/advisories/OBSO-1403-02.pdf
Third Party Advisory
http://assets.yourcircuit.com/Internet/web/Container%20Site/Misc/Footer-content/...
Vendor Advisory
https://networks.unify.com/security/advisories/OBSO-1403-02.pdf
52
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
2/34 · Minimal
Exposure
18/34 · Moderate