Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Cisco IP Phones



Published: 2022-06-16
Risk Medium
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2022-20817
CWE-ID CWE-338
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Unified IP Phone 6901
Hardware solutions / Office equipment, IP-phones, print servers

ATA 187 Analog Telephone Adapter
Hardware solutions / Office equipment, IP-phones, print servers

Unified IP Phone 8945
Hardware solutions / Office equipment, IP-phones, print servers

Unified IP Phone 8961
Hardware solutions / Office equipment, IP-phones, print servers

Unified IP Phone 9951
Hardware solutions / Office equipment, IP-phones, print servers

Unified IP Phone 9971
Hardware solutions / Office equipment, IP-phones, print servers

Unified IP Phone 6911
Hardware solutions / Routers & switches, VoIP, GSM, etc

Unified IP Phone 6921
Hardware solutions / Routers & switches, VoIP, GSM, etc

Unified IP Phone 6941
Hardware solutions / Routers & switches, VoIP, GSM, etc

Unified IP Phone 6945
Hardware solutions / Routers & switches, VoIP, GSM, etc

Unified IP Phone 6961
Hardware solutions / Routers & switches, VoIP, GSM, etc

Unified IP Phone 8941
Other software / Other software solutions

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

EUVDB-ID: #VU64450

Risk: Medium

CVSSv3.1: 6.8 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2022-20817

CWE-ID: CWE-338 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Exploit availability: No

Description

The vulnerability allows a remote attacker to impersonate another user's phone. 

The vulnerability exists due to due to improper key generation during the manufacturing process that could result in duplicated manufactured keys installed on multiple devices. A remote attacker can perform a machine-in-the-middle attack and impersonate another user's phone if the Cisco Unified Communications Manager (CUCM) is in secure mode.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Unified IP Phone 6901 : All versions

ATA 187 Analog Telephone Adapter: All versions

Unified IP Phone 6911: All versions

Unified IP Phone 6921: All versions

Unified IP Phone 6941: All versions

Unified IP Phone 6945: All versions

Unified IP Phone 6961: All versions

Unified IP Phone 8941: All versions

Unified IP Phone 8945 : All versions

Unified IP Phone 8961 : All versions

Unified IP Phone 9951 : All versions

Unified IP Phone 9971 : All versions


CPE2.3 External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cp6901-dup-cert-82jdJGe4

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###