CRLF injection vulnerability in the web-based management (WBM) interface in Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 allows remote authenticated users to modify the root password and consequently access the debug port using the serial interface via the ssh-password parameter to page.cmd.
References
Link | Resource |
---|---|
https://www.modzero.ch/advisories/MZ-14-02-Siemens-Unify-OpenStage.txt | Third Party Advisory |
https://networks.unify.com/security/advisories/OBSO-1501-02.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Information
Published : 2018-04-12 14:29
Updated : 2021-09-09 10:12
NVD link : CVE-2014-9563
Mitre link : CVE-2014-9563
JSON object : View
CWE
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
Products Affected
unify
- openstage_20
- openstage_60
- openstage_sip
- openscape_desk_phone_ip_sip
- openstage_40
atos
- openscape_desk_phone_ip_35g_eco
- openscape_desk_phone_ip_35g
- openscape_desk_phone_ip_55g