Vulnerability Description
A command injection (missing input validation, escaping) in the ftp upgrade configuration interface on the Auerswald COMfort 1200 IP phone 3.4.4.1-10589 allows an authenticated remote attacker (simple user) -- in the same network as the device -- to trigger OS commands (like starting telnetd or opening a reverse shell) via a POST request to the web server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Auerswald | Comfortel 1200 Ip Firmware | 3.4.4.1-10589 |
| Auerswald | Comfortel 1200 Ip | - |
Related Weaknesses (CWE)
References
- https://www.auerswald.de/de/service/81-telefone/schnurgebundene-telefone/1568-coProductVendor Advisory
- https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Auerswald_COMfortExploitThird Party Advisory
- https://www.auerswald.de/de/service/81-telefone/schnurgebundene-telefone/1568-coProductVendor Advisory
- https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Auerswald_COMfortExploitThird Party Advisory
FAQ
What is CVE-2018-19977?
CVE-2018-19977 is a vulnerability with a CVSS score of 8.0 (HIGH). A command injection (missing input validation, escaping) in the ftp upgrade configuration interface on the Auerswald COMfort 1200 IP phone 3.4.4.1-10589 allows an authenticated remote attacker (simple...
How severe is CVE-2018-19977?
CVE-2018-19977 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-19977?
Check the references section above for vendor advisories and patch information. Affected products include: Auerswald Comfortel 1200 Ip Firmware, Auerswald Comfortel 1200 Ip.