A vulnerability in the debug shell of Cisco Video Phone 8875 and Cisco Desk Phone 9800 Series could allow an authenticated, local attacker to access sensitive information on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials with SSH access on the affected device. SSH access is disabled by default.
This vulnerability is due to insufficient validation of user-supplied input by the debug shell of an affected device. An attacker could exploit this vulnerability by sending a crafted SSH client command to the CLI. A successful exploit could allow the attacker to access sensitive information on the underlying operating system.
References
| Link | Resource |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-info-disc-YyxsWStK | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
No history.
Information
Published : 2025-02-19 16:15
Updated : 2025-12-15 21:09
NVD link : CVE-2025-20158
Mitre link : CVE-2025-20158
CVE.ORG link : CVE-2025-20158
JSON object : View
Products Affected
cisco
- desk_phone_9861_firmware
- desk_phone_9851_firmware
- desk_phone_9871_firmware
- video_phone_8875_firmware
- desk_phone_9861
- desk_phone_9841_firmware
- desk_phone_9841
- desk_phone_9871
- desk_phone_9851
- video_phone_8875
CWE
