CVE-2020-3111

high-risk
Published 2020-02-05

A vulnerability in the Cisco Discovery Protocol implementation for the Cisco IP Phone could allow an unauthenticated, adjacent attacker to remotely execute code with root privileges or cause a reload of an affected IP phone. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to the targeted IP phone. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).

Do I need to act?

-
0.23% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10 High
ADJACENT_NETWORK / LOW complexity

Affected Products (20)

Ip Conference Phone 7832 Firmware
Ip Conference Phone 7832 With Multiplatform Firmware
Ip Conference Phone 8832 Firmware
Ip Conference Phone 8832 With Multiplatform Firmware
Ip Phone 6821 Firmware
Ip Phone 6841 Firmware
Ip Phone 6851 Firmware
Ip Phone 6861 Firmware
Ip Phone 6871 Firmware
Ip Phone 7811 Firmware
Ip Phone 7811 With Multiplatform Firmware
Ip Phone 7821 Firmware
Ip Phone 7821 With Multiplatform Firmware
Ip Phone 7841 Firmware
Ip Phone 7841 With Multiplatform Firmware
Ip Phone 7861 Firmware
Ip Phone 7861 With Multiplatform Firmware
Ip Phone 8811 With Multiplatform Firmware

Affected Vendors

51
/ 100
high-risk
Severity 27/34 · High
Exploitability 1/34 · Minimal
Exposure 23/34 · High