HomeCiscoCVE-2025-20350

CVE-2025-20350

HIGH
7.5CVSS
Published: 2025-10-15
Updated: 2025-12-04
AI Analysis

Description

A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 running Cisco SIP Software could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to a buffer overflow when an affected device processes HTTP packets. An attacker could exploit this vulnerability by sending crafted HTTP input to the device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Note: To exploit this vulnerability, the phone must be registered to Cisco Unified Communications Manager and have Web Access enabled. Web Access is disabled by default.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-121

Metadata

Primary Vendor
CISCO
Published
10/15/2025
Last Modified
12/4/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

cisco : desk_phone_9871_firmwarecisco : desk_phone_9841_firmwarecisco : desk_phone_9851_firmwarecisco : desk_phone_9861_firmwarecisco : ip_phone_8865_firmwarecisco : ip_phone_8865_firmwarecisco : ip_phone_8865_firmwarecisco : ip_phone_7811_firmwarecisco : ip_phone_7811_firmwarecisco : ip_phone_7811_firmwarecisco : ip_phone_7821_firmwarecisco : ip_phone_7821_firmwarecisco : ip_phone_7821_firmwarecisco : ip_phone_7841_firmwarecisco : ip_phone_7841_firmwarecisco : ip_phone_7841_firmwarecisco : ip_phone_7861_firmwarecisco : ip_phone_7861_firmwarecisco : ip_phone_7861_firmwarecisco : ip_phone_8811_firmwarecisco : ip_phone_8811_firmwarecisco : ip_phone_8811_firmwarecisco : ip_phone_8832_firmwarecisco : ip_phone_8832_firmwarecisco : ip_phone_8832_firmwarecisco : ip_phone_8841_firmwarecisco : ip_phone_8841_firmwarecisco : ip_phone_8841_firmwarecisco : ip_phone_8845_firmwarecisco : ip_phone_8845_firmwarecisco : ip_phone_8845_firmwarecisco : ip_phone_8851_firmwarecisco : ip_phone_8851_firmwarecisco : ip_phone_8851_firmwarecisco : ip_phone_8861_firmwarecisco : ip_phone_8861_firmwarecisco : ip_phone_8861_firmwarecisco : video_phone_8875_firmwarecisco : video_phone_8875_firmwarecisco : video_phone_8875_firmwarecisco : video_phone_8875_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmwarecisco : ip_phone_8821_firmware

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief