cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2018-0389,https://securityvulnerability.io/vulnerability/CVE-2018-0389,Cisco Small Business SPA514G IP Phones SIP Denial of Service Vulnerability,"A vulnerability in the implementation of Session Initiation Protocol (SIP) processing in Cisco Small Business SPA514G IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SIP request messages by an affected device. An attacker could exploit this vulnerability by sending crafted SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. Cisco has not released software updates that address this vulnerability. This vulnerability affects Cisco Small Business SPA514G IP Phones that are running firmware release 7.6.2SR2 or earlier.",Cisco,Cisco Small Business Spa500 Series Ip Phones,7.5,HIGH,0.000859999970998615,false,,false,false,true,2024-08-05T04:15:19.000Z,,false,false,,2019-03-13T00:00:00.000Z,0 CVE-2019-1683,https://securityvulnerability.io/vulnerability/CVE-2019-1683,"Cisco SPA112, SPA525, and SPA5x5 Series IP Phones Certificate Validation Vulnerability","A vulnerability in the certificate handling component of the Cisco SPA112, SPA525, and SPA5X5 Series IP Phones could allow an unauthenticated, remote attacker to listen to or control some aspects of a Transport Level Security (TLS)-encrypted Session Initiation Protocol (SIP) conversation. The vulnerability is due to the improper validation of server certificates. An attacker could exploit this vulnerability by crafting a malicious server certificate to present to the client. An exploit could allow an attacker to eavesdrop on TLS-encrypted traffic and potentially route or redirect calls initiated by an affected device. Affected software include version 7.6.2 of the Cisco Small Business SPA525 Series IP Phones and Cisco Small Business SPA5X5 Series IP Phones and version 1.4.2 of the Cisco Small Business SPA500 Series IP Phones and Cisco Small Business SPA112 Series IP Phones.",Cisco,"Cisco Small Business Spa500 Series Ip Phones,Cisco Small Business Spa112 Series Ip Phones,Cisco Small Business Spa525 Series Ip Phones,Cisco Small Business Spa5x5 Series Ip Phones",6.5,MEDIUM,0.0013000000035390258,false,,false,false,true,2024-08-04T19:16:04.000Z,,false,false,,2019-02-25T17:29:00.000Z,0 CVE-2017-12219,https://securityvulnerability.io/vulnerability/CVE-2017-12219,,"A vulnerability in the handling of IP fragments for the Cisco Small Business SPA300, SPA500, and SPA51x Series IP Phones could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to the inability to handle many large IP fragments for reassembly in a short duration. An attacker could exploit this vulnerability by sending a crafted stream of IP fragments to the targeted device. An exploit could allow the attacker to cause a DoS condition when the device unexpectedly reloads. Cisco Bug IDs: CSCve82586.",Cisco,"Cisco Small Business Spa300, Spa500, And Spa51x Series Ip Phones",7.5,HIGH,0.0029899999499320984,false,,false,false,false,,,false,false,,2017-09-21T05:00:00.000Z,0