Insufficient Input Validation in Cisco Video Phone and Desk Phone Products
CVE-2025-20158

4.4MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
19 February 2025

Badges

👾 Exploit Exists

Summary

A flaw in the debug shell of certain Cisco Video Phones and Desk Phones allows an authenticated, local attacker with valid SSH credentials to gain unauthorized access to sensitive information on the device. The exploitation is made possible due to inadequate validation of commands supplied by the user. Although SSH access is disabled by default, attackers could circumvent this restriction, potentially exposing critical system data by sending specially crafted commands to the device's command-line interface.

Affected Version(s)

Cisco Session Initiation Protocol (SIP) Software 3.1(1)

Cisco Session Initiation Protocol (SIP) Software 3.0(1)

Cisco Session Initiation Protocol (SIP) Software 2.3(1)

References

CVSS V3.1

Score:
4.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.