Wednesday, April 30, 2025
HomeCiscoCisco Small Business IP Phones Flaw Allows XSS & Injection Attacks

Cisco Small Business IP Phones Flaw Allows XSS & Injection Attacks

Published on

SIEM as a Service

Follow Us on Google News

Cisco has published a security advisory that states that they have discovered two vulnerabilities, an XSS and an HTML injection vulnerability.

These vulnerabilities existed in the SPA500 series of the Cisco Small Business IP Phones.

CVE-2023-20181: XSS Vulnerability

This vulnerability exists due to insufficient validation of user-supplied input in the web-based management interface of Cisco Small Business SPA500 Series IP Phones that an attacker can exploit, creating a crafted link resulting in arbitrary script execution on the interface.

- Advertisement - Google News

The CVSS Score for this vulnerability is given as 6.1 (Medium)

CVE-2023-20218: HTML Injection Vulnerability

This is an HTML injection vulnerability that exists due to insufficient sanitization of user-supplied inputs in the web-based management interface of the Cisco Small Business SPA500 Series IP Phones that can be exploited by a threat actor by creating a crafted link resulting in potential alteration in the web page and redirect the user to malicious websites.

Furthermore, this can also be used to conduct other client-side attacks. The CVSS Score for this vulnerability is given as 5.8(Medium)

Cisco confirmed that there had been no workarounds for fixing these vulnerabilities. In addition to this, Cisco mentioned that they wouldn’t be releasing security patches for these vulnerabilities as the Cisco Small Business SPA500 Series IP Phones reached the end-of-life process on August 13, 2018.

Users of these products are recommended to switch to other alternative Cisco products to avoid these vulnerabilities.

Stay up-to-date with the latest Cyber Security News; follow us on GoogleNewsLinkedinTwitterand Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks

Trellix, a leader in cybersecurity solutions, has unveiled its latest innovation, the Trellix Phishing...

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace's Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been...

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations

Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising...

Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams

Cybersecurity researchers have uncovered the intricate tactics, techniques, and procedures (TTPs) employed by threat...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks

Trellix, a leader in cybersecurity solutions, has unveiled its latest innovation, the Trellix Phishing...

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace's Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been...

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations

Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising...