#VU54621 Buffer overflow in Hardware solutions


Published: 2021-07-08

Vulnerability identifier: #VU54621

Vulnerability risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-33478

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Cisco IP Phone 8800 Series with Multiplatform Firmware
Hardware solutions / Office equipment, IP-phones, print servers
Cisco IP Phone 8811 with Multiplatform Firmware
Hardware solutions / Office equipment, IP-phones, print servers
Cisco IP Phone 8841 with Multiplatform Firmware
Hardware solutions / Office equipment, IP-phones, print servers
Cisco IP Phone 8851 with Multiplatform Firmware
Hardware solutions / Office equipment, IP-phones, print servers
Cisco IP Phone 8861 with Multiplatform Firmware
Hardware solutions / Office equipment, IP-phones, print servers
Cisco IP Phone 8845 with Multiplatform Firmware
Hardware solutions / Office equipment, IP-phones, print servers
Cisco IP Phone 8865 with Multiplatform Firmware
Hardware solutions / Office equipment, IP-phones, print servers
Cisco IP Phone 8845
Hardware solutions / Office equipment, IP-phones, print servers
Cisco IP Phone 8800 Series
Hardware solutions / Office equipment, IP-phones, print servers
Cisco IP Phone 8811
Hardware solutions / Office equipment, IP-phones, print servers
Cisco IP Phone 8841
Hardware solutions / Office equipment, IP-phones, print servers
Cisco IP Phone 8851
Hardware solutions / Office equipment, IP-phones, print servers
Cisco Wireless IP Phone 8821
Hardware solutions / Office equipment, IP-phones, print servers
Cisco IP Phone 8865
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco IP Phone 8861
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor:

Description

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the TrustZone implementation. An attacker with physical access can dismount the backplate of the device, trigger a specific series of impulses on the chipset and execute arbitrary code on the target system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-brcm-mxc-jul2021-26LqUZUh


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability