CVE-2020-3161 (CNNVD-202004-1099)

CRITICAL 有利用代码
中文标题:
多款Cisco产品输入验证错误漏洞
英文标题:
Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability
CVSS分数: 9.8
发布时间: 2020-04-15 20:10:11
漏洞类型: 输入验证错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Cisco IP Phone 7811等都是美国思科(Cisco)公司的一款IP电话。 多款Cisco产品的Web server中存在输入验证错误漏洞,该漏洞源于程序没有对HTTP请求进行正确的输入验证。攻击者可借助特制HTTP请求利用该漏洞以root权限执行代码或造成拒绝服务。以下产品及版本受到影响:Cisco IP Phone 7811;IP Phone 7821;IP Phone 7841;IP Phone 7861;IP Phone 8811;IP Phone 8841;IP Phone 8845;IP Phone 8851;IP Phone 8861;IP Phone 8865;Unified IP Conference Phone 8831;Wireless IP Phone 8821;Wireless IP Phone 8821-EX。

英文描述:

A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.

CWE类型:
CWE-20
标签:
dos hardware Jacob Baines
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Cisco Cisco IP phone n/a - - cpe:2.3:a:cisco:cisco_ip_phone:n_a:*:*:*:*:*:*:*
cisco ip_phone_8865_firmware 10.3\(1\)es14 - - cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\(1\)es14:*:*:*:*:*:*:*
cisco ip_phone_8865_firmware 11.0\(1\) - - cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco ip_phone_8865_firmware 11.0\(5\)sr1 - - cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\(5\)sr1:*:*:*:*:*:*:*
cisco ip_phone_8851_firmware 10.3\(1\)es14 - - cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\(1\)es14:*:*:*:*:*:*:*
cisco ip_phone_8851_firmware 11.0\(1\) - - cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco ip_phone_8851_firmware 11.0\(5\)sr1 - - cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\(5\)sr1:*:*:*:*:*:*:*
cisco ip_phone_7841_firmware 11.0\(1\) - - cpe:2.3:o:cisco:ip_phone_7841_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco ip_phone_7821_firmware 11.0\(1\) - - cpe:2.3:o:cisco:ip_phone_7821_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco ip_phone_8811_firmware 10.3\(1\)es14 - - cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\(1\)es14:*:*:*:*:*:*:*
cisco ip_phone_8811_firmware 11.0\(1\) - - cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco ip_phone_8811_firmware 11.0\(5\)sr1 - - cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\(5\)sr1:*:*:*:*:*:*:*
cisco ip_phone_8861_firmware 10.3\(1\)es14 - - cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\(1\)es14:*:*:*:*:*:*:*
cisco ip_phone_8861_firmware 11.0\(1\) - - cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco ip_phone_8861_firmware 11.0\(5\)sr1 - - cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\(5\)sr1:*:*:*:*:*:*:*
cisco ip_phone_8845_firmware 10.3\(1\)es14 - - cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\(1\)es14:*:*:*:*:*:*:*
cisco ip_phone_8845_firmware 11.0\(1\) - - cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco ip_phone_8845_firmware 11.0\(5\)sr1 - - cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\(5\)sr1:*:*:*:*:*:*:*
cisco ip_phone_7861_firmware 11.0\(1\) - - cpe:2.3:o:cisco:ip_phone_7861_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco ip_phone_8841_firmware 10.3\(1\)es14 - - cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\(1\)es14:*:*:*:*:*:*:*
cisco ip_phone_8841_firmware 11.0\(1\) - - cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco ip_phone_8841_firmware 11.0\(5\)sr1 - - cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\(5\)sr1:*:*:*:*:*:*:*
cisco ip_phone_7811_firmware 11.0\(1\) - - cpe:2.3:o:cisco:ip_phone_7811_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco ip_phone_8821_firmware 10.3\(1\)es14 - - cpe:2.3:o:cisco:ip_phone_8821_firmware:10.3\(1\)es14:*:*:*:*:*:*:*
cisco ip_phone_8821_firmware 11.0\(1\) - - cpe:2.3:o:cisco:ip_phone_8821_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco ip_phone_8821_firmware 11.0\(5\)sr1 - - cpe:2.3:o:cisco:ip_phone_8821_firmware:11.0\(5\)sr1:*:*:*:*:*:*:*
cisco ip_phone_8821-ex_firmware 10.3\(1\)es14 - - cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:10.3\(1\)es14:*:*:*:*:*:*:*
cisco ip_phone_8821-ex_firmware 11.0\(1\) - - cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco ip_phone_8821-ex_firmware 11.0\(5\)sr1 - - cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:11.0\(5\)sr1:*:*:*:*:*:*:*
cisco 8831_firmware 10.3\(1\)es14 - - cpe:2.3:o:cisco:8831_firmware:10.3\(1\)es14:*:*:*:*:*:*:*
cisco 8831_firmware 11.0\(1\) - - cpe:2.3:o:cisco:8831_firmware:11.0\(1\):*:*:*:*:*:*:*
cisco 8831_firmware 11.0\(5\)sr1 - - cpe:2.3:o:cisco:8831_firmware:11.0\(5\)sr1:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20200415 Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
134c704f-9b21-4f2e-91b3-4a467353bcc0 OTHER
nvd.nist.gov
访问
ExploitDB EDB-48342 EXPLOIT
exploitdb
访问
Download Exploit EDB-48342 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2020-3161 ADVISORY
cve.org
访问
CVSS评分详情
3.0 (cna)
CRITICAL
9.8
CVSS向量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2020-04-15 20:10:11
修改时间:
2025-10-21 23:35:45
创建时间:
2025-11-11 15:36:18
更新时间:
2025-11-11 16:54:13
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2020-3161 2025-11-11 15:20:36 2025-11-11 07:36:18
NVD nvd_CVE-2020-3161 2025-11-11 14:56:57 2025-11-11 07:44:43
CNNVD cnnvd_CNNVD-202004-1099 2025-11-11 15:10:24 2025-11-11 07:55:47
EXPLOITDB exploitdb_EDB-48342 2025-11-11 15:05:21 2025-11-11 08:54:13
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:54:13
references_count: 3 → 6; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 3 -> 6
  • tags_count: 0 -> 3
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:55:47
vulnerability_type: 未提取 → 输入验证错误; cnnvd_id: 未提取 → CNNVD-202004-1099; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 输入验证错误
  • cnnvd_id: 未提取 -> CNNVD-202004-1099
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:44:43
affected_products_count: 1 → 32; references_count: 2 → 3; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 1 -> 32
  • references_count: 2 -> 3
  • data_sources: ['cve'] -> ['cve', 'nvd']