Thursday, February 13, 2025
HomeCiscoCisco Small Business IP Phones Flaw Allows XSS & Injection Attacks

Cisco Small Business IP Phones Flaw Allows XSS & Injection Attacks

Published on

SIEM as a Service

Follow Us on Google News

Cisco has published a security advisory that states that they have discovered two vulnerabilities, an XSS and an HTML injection vulnerability.

These vulnerabilities existed in the SPA500 series of the Cisco Small Business IP Phones.

CVE-2023-20181: XSS Vulnerability

This vulnerability exists due to insufficient validation of user-supplied input in the web-based management interface of Cisco Small Business SPA500 Series IP Phones that an attacker can exploit, creating a crafted link resulting in arbitrary script execution on the interface.

The CVSS Score for this vulnerability is given as 6.1 (Medium)

CVE-2023-20218: HTML Injection Vulnerability

This is an HTML injection vulnerability that exists due to insufficient sanitization of user-supplied inputs in the web-based management interface of the Cisco Small Business SPA500 Series IP Phones that can be exploited by a threat actor by creating a crafted link resulting in potential alteration in the web page and redirect the user to malicious websites.

Furthermore, this can also be used to conduct other client-side attacks. The CVSS Score for this vulnerability is given as 5.8(Medium)

Cisco confirmed that there had been no workarounds for fixing these vulnerabilities. In addition to this, Cisco mentioned that they wouldn’t be releasing security patches for these vulnerabilities as the Cisco Small Business SPA500 Series IP Phones reached the end-of-life process on August 13, 2018.

Users of these products are recommended to switch to other alternative Cisco products to avoid these vulnerabilities.

Stay up-to-date with the latest Cyber Security News; follow us on GoogleNews, Linkedin, Twitter, and Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Palo Alto PAN-OS Zero-Day Flaw Allows Attackers to Bypass Web Interface Authentication

Palo Alto Networks has disclosed a zero-day vulnerability in its PAN-OS software (CVE-2025-0108), allowing...

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to...

Hackers Exploit Ivanti Connect Secure Vulnerability to Inject SPAWNCHIMERA malware

In a concerning development, cybersecurity experts have identified active exploitation of a critical vulnerability...

ZeroLogon Ransomware Exploits Windows AD to Hijack Domain Controller Access

A newly intensified wave of ransomware attacks has surfaced, leveraging the infamous ZeroLogon vulnerability...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Palo Alto PAN-OS Zero-Day Flaw Allows Attackers to Bypass Web Interface Authentication

Palo Alto Networks has disclosed a zero-day vulnerability in its PAN-OS software (CVE-2025-0108), allowing...

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to...

Hackers Exploit Ivanti Connect Secure Vulnerability to Inject SPAWNCHIMERA malware

In a concerning development, cybersecurity experts have identified active exploitation of a critical vulnerability...