{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T03:37:45.312","vulnerabilities":[{"cve":{"id":"CVE-2018-0461","sourceIdentifier":"psirt@cisco.com","published":"2019-01-10T16:29:00.287","lastModified":"2024-11-21T03:38:16.827","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Cisco IP Phone 8800 Series Software could allow an unauthenticated, remote attacker to conduct an arbitrary script injection attack on an affected device. The vulnerability exists because the software running on an affected device insufficiently validates user-supplied data. An attacker could exploit this vulnerability by persuading a user to click a malicious link provided to the user or through the interface of an affected device. A successful exploit could allow an attacker to execute arbitrary script code in the context of the user interface or access sensitive system-based information, which under normal circumstances should be prohibited."},{"lang":"es","value":"Una vulnerabilidad en el software Cisco IP Phone 8800 Series podría permitir que un atacante remoto sin autenticar lleve a cabo un ataque de inyección de scripts en un sistema afectado. La vulnerabilidad existe debido a que el software que se ejecuta en un dispositivo afectado no valida lo suficiente los datos proporcionados por el usuario. Un atacante podría explotar esta vulnerabilidad convenciendo a un usuario de que haga clic sobre un enlace malicioso que se le proporciona o mediante la interfaz de un dispositivo afectado. Un exploit con éxito podría permitir al atacante ejecutar código script arbitrario en el contexto de la interfaz de usuario o acceder a información sensible del sistema, lo que en circunstancias normales debería estar prohibido."}],"metrics":{"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ip_phone_8800_series_firmware:12.5\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"98070A9A-E891-490E-9D20-65BB551DC9EE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*","matchCriteriaId":"D0CC3127-3152-4906-9FE0-BC6F21DCADAA"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*","matchCriteriaId":"7944CC9C-AE08-4F30-AF65-134DADBD0FA1"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*","matchCriteriaId":"A313E64A-F43C-4FBA-A389-6171CBD709C0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*","matchCriteriaId":"8AF6DC5E-F582-445E-BF05-2D55A0954663"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*","matchCriteriaId":"090EE553-01D5-45F0-87A4-E1167F46EB77"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*","matchCriteriaId":"BB99B9AB-64B5-4989-9579-A1BB5D2D87EF"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/106515","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-phone-script-injection","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/106515","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-phone-script-injection","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}