Known Vulnerabilities for Unified Ip Phones 9900 Series Firmware by Cisco
Listed below are 8 of the newest known vulnerabilities associated with "Unified Ip Phones 9900 Series Firmware" by "Cisco".
These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.
Data on known vulnerable versions is also displayed based on information from known CPEs
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2015-4226 | The packet-storing feature on Cisco 9900 phones with firmware 9.3(2) does not properly support the RTP protocol, which allows... | 7.1 - HIGH | 2015-06-30 | 2017-01-04 |
| CVE-2015-0603 | Cisco Unified IP 9900 phones with firmware 9.4(.1) and earlier use weak permissions for unspecified files, which allows local... | 4.6 - MEDIUM | 2015-02-07 | 2017-09-08 |
| CVE-2015-0602 | The mobility extension on Cisco Unified IP 9900 phones with firmware 9.4(.1) and earlier allows remote attackers to obtain se... | 5 - MEDIUM | 2015-02-07 | 2017-09-08 |
| CVE-2015-0600 | The mobility extension on Cisco Unified IP 9900 phones with firmware 9.4(.1) and earlier allows remote attackers to cause a d... | 5 - MEDIUM | 2015-02-07 | 2017-09-08 |
| CVE-2014-0658 | Cisco 9900 Unified IP phones allow remote attackers to cause a denial of service (unregistration) via a crafted SIP header, a... | 5.4 - MEDIUM | 2014-01-10 | 2017-08-29 |
| CVE-2013-5533 | The image-upgrade functionality on Cisco 9900 Unified IP phones allows local users to gain privileges by placing shell comman... | 6 - MEDIUM | 2013-10-11 | 2016-09-22 |
| CVE-2013-5532 | Buffer overflow in the web-application interface on Cisco 9900 IP phones allows remote attackers to cause a denial of service... | 5 - MEDIUM | 2013-10-11 | 2016-09-22 |
| CVE-2013-3426 | The Serviceability servlet on Cisco 9900 IP phones does not properly restrict paths, which allows remote attackers to read ar... | 5 - MEDIUM | 2013-07-18 | 2013-07-18 |