Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-1637 (GCVE-0-2011-1637)
Vulnerability from cvelistv5 – Published: 2011-06-02 20:00 – Updated: 2024-08-06 22:37- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:37:24.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48075",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48075"
},
{
"name": "72719",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/72719"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "cisco-uipp-sign-security-bypass(67743)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-06-01T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01.000Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1025588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48075",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48075"
},
{
"name": "72719",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/72719"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "cisco-uipp-sign-security-bypass(67743)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1637",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025588",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48075",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48075"
},
{
"name": "72719",
"refsource": "OSVDB",
"url": "http://osvdb.org/72719"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "cisco-uipp-sign-security-bypass(67743)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2011-1637",
"datePublished": "2011-06-02T20:00:00.000Z",
"dateReserved": "2011-04-05T00:00:00.000Z",
"dateUpdated": "2024-08-06T22:37:24.683Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTA-2011-AVI-328
Vulnerability from certfr_avis - Published: 2011-06-03 - Updated: 2011-06-03
Plusieurs vulnérabilités permettant une élévation de privilège ainsi qu'un contournement de la politique de sécurité ont été découvertes dans différents produits de la gamme Cisco Unified IP Phones 7900 Series.
Description
Trois failles ont été découvertes dans plusieurs produits de la gamme Cisco Unified IP Phones 7900 Series.
Deux de ces failles (CVE-2011-1602 et CVE-2011-1603) permettent à une personne malintentionnée d'élever ses privilèges et, ainsi, de modifier la configuration du poste, voir d'obtenir des informations sensibles.
La troisième faille (CVE-2011-1637) permet à un utilisateur malintentionné de contourner la vérification des signatures de l'image logicielle chargée sur le téléphone.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | IP Phone | Cisco Unified IP Phone 7961G-GE ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7942G ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7961G ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7941G ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7971G-GE ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7941G-GE ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7965G ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7911G ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7945G ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7906G ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7975G ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7931G ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7970G ; | ||
| Cisco | IP Phone | Cisco Unified IP Phone 7962G ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco Unified IP Phone 7961G-GE ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7942G ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7961G ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7941G ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7971G-GE ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7941G-GE ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7965G ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7911G ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7945G ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7906G ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7975G ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7931G ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7970G ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified IP Phone 7962G ;",
"product": {
"name": "IP Phone",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nTrois failles ont \u00e9t\u00e9 d\u00e9couvertes dans plusieurs produits de la gamme\nCisco Unified IP Phones 7900 Series.\n\nDeux de ces failles (CVE-2011-1602 et CVE-2011-1603) permettent \u00e0 une\npersonne malintentionn\u00e9e d\u0027\u00e9lever ses privil\u00e8ges et, ainsi, de modifier\nla configuration du poste, voir d\u0027obtenir des informations sensibles.\n\nLa troisi\u00e8me faille (CVE-2011-1637) permet \u00e0 un utilisateur\nmalintentionn\u00e9 de contourner la v\u00e9rification des signatures de l\u0027image\nlogicielle charg\u00e9e sur le t\u00e9l\u00e9phone.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1603",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1603"
},
{
"name": "CVE-2011-1602",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1602"
},
{
"name": "CVE-2011-1637",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1637"
}
],
"initial_release_date": "2011-06-03T00:00:00",
"last_revision_date": "2011-06-03T00:00:00",
"links": [],
"reference": "CERTA-2011-AVI-328",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-06-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s permettant une \u00e9l\u00e9vation de privil\u00e8ge ainsi\nqu\u0027un contournement de la politique de s\u00e9curit\u00e9 ont \u00e9t\u00e9 d\u00e9couvertes dans\ndiff\u00e9rents produits de la gamme \u003cspan class=\"textit\"\u003eCisco Unified IP\nPhones 7900 Series\u003c/span\u003e.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans les postes t\u00e9l\u00e9phoniques Cisco Unified Phones 7900 Series",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco 20110601-phone du 01 juin 2011",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20110601-phone.shtml"
}
]
}
GHSA-5228-QFM2-W928
Vulnerability from github – Published: 2022-05-17 02:00 – Updated: 2025-04-11 03:47Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962.
{
"affected": [],
"aliases": [
"CVE-2011-1637"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-06-02T20:55:00Z",
"severity": "LOW"
},
"details": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962.",
"id": "GHSA-5228-qfm2-w928",
"modified": "2025-04-11T03:47:33Z",
"published": "2022-05-17T02:00:14Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1637"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
},
{
"type": "WEB",
"url": "http://osvdb.org/72719"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/44814"
},
{
"type": "WEB",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/48075"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1025588"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2011-1637
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-1637",
"description": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962.",
"id": "GSD-2011-1637"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-1637"
],
"details": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962.",
"id": "GSD-2011-1637",
"modified": "2023-12-13T01:19:08.264724Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1637",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1025588",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "44814",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "48075",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48075"
},
{
"name": "72719",
"refsource": "OSVDB",
"url": "http://osvdb.org/72719"
},
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "cisco-uipp-sign-security-bypass(67743)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7970g:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7971g-ge:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7942g:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7962g:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7965g:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7941g-ge:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7941g:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7961g:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7961g-ge:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7906:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7931g:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7945g:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7975g:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:cisco:unified_ip_phone_7911g:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:sr1:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "9.1\\(1\\)",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-1637"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20110601 Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series",
"refsource": "CISCO",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"name": "1025588",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1025588"
},
{
"name": "72719",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/72719"
},
{
"name": "48075",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/48075"
},
{
"name": "44814",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/44814/"
},
{
"name": "cisco-uipp-sign-security-bypass(67743)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 2.7,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-08-17T01:34Z",
"publishedDate": "2011-06-02T20:55Z"
}
}
}
FKIE_CVE-2011-1637
Vulnerability from fkie_nvd - Published: 2011-06-02 20:55 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7906:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3266BED2-F1D9-4A92-9E42-330F11092500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7911g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F66742A-EAEC-4C94-BF73-EAEDFAFC869A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7931g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F187F63-6743-403D-B2E7-E85AE5C66A40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6195E0CB-4F57-444C-A6EA-F54A1425BCD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7941g-ge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7056672E-4DAF-45A8-92CE-D8959A9E92A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7942g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F73CEFE-BD53-4E37-859D-50EE47AC2588",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7945g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B48EB03E-1973-42C5-9273-DC015B481D77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73C598F6-730F-490A-9492-332504ABC780",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7961g-ge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA69ACC-3C1B-42E7-8463-0B29100325E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7962g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F428E75-570F-4B3E-9476-62D09268BA21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7965g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7274698-747C-4D78-B62E-41FCBBD24702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7970g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E315A6D0-1532-4D60-85F4-361314CF8378",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7971g-ge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25D1D922-4411-417A-9A1A-5DD52DADECD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:unified_ip_phone_7975g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70130677-ACFA-43FA-B7D7-19E39508B290",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:sr1:*:*:*:*:*:*",
"matchCriteriaId": "05C4958B-44D7-44BC-9F85-84A1B0728AB0",
"versionEndIncluding": "9.1\\(1\\)",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6280E194-FE86-474A-932D-AE354B94CEB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2444CB4D-7456-4793-9625-ED7260BB3B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "9FBECF8A-ADE5-419C-9555-072F5B06AB37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C960837C-CEE9-4C76-B991-9481A2B435C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B08CD7F6-E911-456B-85EF-D2B41404CA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CAEAC202-D06A-4755-AE28-C9159A7A81AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6A5A2847-8201-409F-BEDD-E9EF4BC5FFBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B8A81F19-81DC-421D-A56A-BED816549837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0A59EC96-7C90-4FE5-AD09-518C1426AC01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3922D4C4-3419-4404-97AD-12F4C48E6846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE1EA396-2F43-4328-BDEF-A3D09079AA40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0D074ED1-2825-40DD-B2D1-5BCBBAE01B1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "57669D49-6E68-49AE-A9C5-C8DE0EB0A958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "CF399AEB-FEF5-476D-AE72-66E4A1FBFB4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "125B5726-00D8-4659-8CD3-51FB1FC15B2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "96B08C41-1EBD-4BB9-ACE2-339F202C5900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1377BBE4-9DBB-4DC6-BAC1-EBB70FEF81B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DBFCA9D7-4C28-4179-AB6F-BC2224652307",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BF953655-CEF4-44C6-B160-958B473BD715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AE2B326C-12B5-4C49-9539-463025C98DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D3A4CD97-C275-4BD2-B8DD-B77D2F5B0F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "476A19F8-C434-4516-BC54-FA4105A0D91B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09B13B3B-8486-4731-B847-618E3B5CEA5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3865DF2E-C10E-4D08-8E4B-2B0419A2E7D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DC573D9B-B404-4114-B20C-EAFFC17E789F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "19C7FD95-8859-4949-BD13-27A5C6962951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3BD895B6-0426-4745-B123-467F039ABB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "33B8CE79-536C-41B7-A4A1-B9A20CCA16DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76E5D981-50BE-4343-B276-927DCE1EDB1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A8E071E7-B6C1-4114-A086-70FEEA2C8708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0B28F7-92B3-42BD-AE16-3AA274A146A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "718A1D71-5E2A-4AE8-95EF-EE40C56A51E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09F0153B-2308-459F-B229-B7ECFF283D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD86E8B0-E265-4430-B0F7-C927F512AAE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "57FAA07B-ED2D-4AB8-9A1B-A0171CD1FD0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BCEFC47B-7A45-4463-84F2-810A403FA57F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "428FE8DD-EA2B-437A-9743-63FBC65988DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76D23CE5-CC41-4362-BE5F-B9A9CC0927E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7F51D05-5AF8-4D09-B514-C3070C6882C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "651C8655-A582-4369-A577-0180F453A745",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A216D492-CF4C-481C-98EF-DF31A08F1D46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "97C1A6BA-D089-4FFA-B49E-B1F26DCCF840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "83BF1C31-D074-448B-8F59-5E95B0484EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A82AB2C6-0841-4D4D-8BA4-76429BBC54D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9760EC13-0088-49D2-8A81-7092CB4D30D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3CDA5224-3D1A-42BD-AE6E-9E300B0F9B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09B6D133-971E-471C-8A64-71CF26A11021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CF686601-6ABB-4F32-B901-95DF37391956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "73513DB9-49C8-4F42-949D-D9F86B580D31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "91D4C364-279B-4C67-9283-3714E7D6B38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "49BCEEE7-BF82-4E01-ABCE-3CA26DD8589E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E4F80EA3-53BD-4B52-A214-9664C624D076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E5BEEB83-61A1-4220-9C5B-A89BE24ACAD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94C96460-C880-483D-9284-2DE1303B81C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4F66A107-9CB7-4733-8EA8-D4F0B302ECC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "64752C75-574A-4F5A-AC57-1CA8D489D485",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7AE98265-DB03-49B4-A350-891C3094B763",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "10018552-62CB-407B-8537-69D88A3B939C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8C48BA3E-D5E3-4F00-83EF-56BED2F62D6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F9245949-323F-49A0-9107-D4045907E279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
"matchCriteriaId": "59FB8108-BF02-43A9-9F34-CBF9F0CCDA38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5AC3EC09-A0E6-4DAB-AC2E-EA70EE527EAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B69D060F-C29E-4C1A-97A0-AE4F5D2DCE8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "420077D0-B470-4D81-B045-5F01D6BC4510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6DD89E9A-21A4-4CB1-BCFA-61069B563E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BF50B8FC-81D0-40B1-B6C7-107063434F82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E7D05CD6-BB15-413E-87CC-0FCCF65B8A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4A8176E3-2EC6-4913-A3FE-C1AD825644E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BA1404C4-0B0E-4DC9-84BE-58E1997CDBED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BEEDD45-083C-40E2-BF64-42F3169DA594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "68AFE44A-B5D6-4226-B543-4F2AFC81B325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FFDA5D26-5770-4E04-A83C-BEC72D63EC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA6B9F1E-A05A-4298-B486-E198394CFA80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5FA01848-0BC0-43D3-9217-1E93703537AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "51C5EE31-6775-4D17-BA53-EF86B6E3194F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AB6BB885-7EA3-43D5-979D-F52C9B177367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "772B9E67-F952-4CE1-BC90-F64FA0200004",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "85F5A4DE-2F0F-405C-81BF-414B7AD7763B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "115D3DC6-EFA3-45ED-AC20-6A4D62CC0EA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "2BDB93D6-DE27-4942-82D0-CBD4DD79F951",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94AE6F39-8757-4A37-A727-7FF7D83DF736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ED05DB1F-6FA9-454E-B7A2-D7C8DA8287D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6E2B55BE-A7A3-4177-85B6-60F3B9D69815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "651FD81E-1366-4063-A447-22E294891573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E9F33AA3-FCD3-452A-AF3B-03116285C798",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9FD30D8F-CCFE-4083-85DC-8CFA752D5E84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "AEBCB775-BB7A-4F90-92B4-0C68052633F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2B3C1E7D-BD12-4075-AD5C-77E00DFDC906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B57955BA-2832-4E81-AE44-9270735A6D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A019DDDC-E804-4B2D-B964-6ECA74EA687B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A25D6C37-0C74-4028-BC11-35D24040D3A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F0221F9C-9523-473E-9FF2-ECB53DD21B43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3EAED02F-E537-438F-A8E1-6E59AB15640F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "25DD97A0-AE36-4DB8-8053-821B9D85CF1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8243BD9C-C96A-4C0B-9FF2-E7B658D41822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6CF6ADB0-0E11-4FA8-9B5C-07E1A948CC84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "ACF28CB5-42AD-476A-8A4B-86B93F7BE5EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
"matchCriteriaId": "18215EE7-7384-4CEE-B76F-F7EE3005DE96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8BBECFD9-6B52-4684-BD8C-17810FBE3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "208D8F53-4DC5-4433-97E7-DBA8F3E7C64F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "445F973B-696F-41A5-8453-650EE60E077E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D558EE52-08DA-457F-9963-8ED3B4453649",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ECAA4377-B354-424F-A3CB-0CB240A9FD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0B033C4-D0D4-4F54-B194-70400C269558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "099E5CE4-FBE8-408F-A841-1ED04BE1052E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B44FF741-F9DA-441C-9A32-E60BE86A14DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8F45D8CD-3DBC-4323-AE47-5B1D0E50AC59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "3D52DFCD-A19E-4AD3-910A-B69D1912A466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "7B3F7913-DA92-45F3-B07B-C1234D66DA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
"matchCriteriaId": "EB3B8A26-C420-41D4-9857-835450975293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
"matchCriteriaId": "92700231-D9EC-4DEA-BD03-85941CBEB329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "921A0760-61B3-4638-9832-1AFEB58F1391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E0C90630-055A-46AB-A1D6-34FFE79308D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "A4816823-C122-4A33-880E-476750188C39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2ABBEAED-440B-4C07-A770-8E6EEA4515EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "BC009A50-5928-41EF-81F3-1AF8E21A3C46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "FC36908D-D296-4B0B-A618-5F4B6625373A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1956D3D0-BEC7-4A4E-A55F-28132C2DFE06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "103E5E79-348A-44EA-B7D5-227C5C3E0525",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "481960DB-2DA7-4350-952D-4C6B7DFE77F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D5366114-385A-446E-9458-81FE3A004070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AEBB4320-84AA-4335-975E-F58101B1E0C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "28817920-CDB6-425D-8299-10FD9934CCD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ABB4ABDD-0489-431C-9191-3D08339959DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "D2890533-3892-4FE6-9400-568F8818EA51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2668948E-E796-43FC-A566-C49A77A15F89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "9FFA6473-9FD4-40F5-A200-CA112883EEE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B0E6A64B-F25B-492C-8214-0FE52FC084F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
"matchCriteriaId": "8962ADD0-45EE-4655-8E60-7601EEFA3902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*",
"matchCriteriaId": "01192CB6-0737-450E-92B0-CF5ECFDF8328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr2:*:*:*:*:*:*",
"matchCriteriaId": "5FFF9124-18F2-4044-8928-91D6146C6F31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EA3FDB83-6E4D-4E06-84D5-C5E5D2B14900",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962."
},
{
"lang": "es",
"value": "Los dispositivos Cisco Unified IP Phones 7900 (tambi\u00e9n conocido como tel\u00e9fonos TNP) con el software anterior a la v9.2.1 no verifican adecuadamente las firmas de im\u00e1genes de software, lo que permite a usuarios locales conseguir privilegios a trav\u00e9s de una imagen hecha a mano. Error tambi\u00e9n conocido como Bug ID CSCtn65962."
}
],
"id": "CVE-2011-1637",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 2.7,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-06-02T20:55:03.480",
"references": [
{
"source": "psirt@cisco.com",
"url": "http://osvdb.org/72719"
},
{
"source": "psirt@cisco.com",
"url": "http://secunia.com/advisories/44814/"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securityfocus.com/bid/48075"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"source": "psirt@cisco.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/72719"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/44814/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80111.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/48075"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025588"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67743"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.