Summary
This host is running Aastra IP Telephone and is prone to security bypass vulnerability.
Impact
Successful exploitation will allow attackers to access the device and gain privileged access.
Impact Level: Application
Solution
Upgrade to latest version of Aastra 6753i IP Telephone. For details refer http://www.aastra.in/aastra-6753i.htm
Insight
Aastra 6753i IP Phone installs with default hard coded administrator credentials (username/password combination).
Affected
Aastra 6753i IP Telephone
References
Severity
Classification
-
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Adobe Flash Player Code Execution and DoS Vulnerabilities (Linux)
- Adobe Acrobat Multiple Unspecified Vulnerabilities-01 Sep13 (Windows)
- Adobe Acrobat Sandbox Bypass Vulnerability - Aug14 (Windows)
- Adobe Acrobat Multiple Unspecified Vulnerabilities -01 May13 (Windows)
- Adobe Air Code Execution and DoS Vulnerabilities (MAC OS X)