{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-20335","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2024-10-10T19:15:13.255Z","datePublished":"2025-09-03T17:41:06.201Z","dateUpdated":"2025-09-03T17:56:55.586Z"},"containers":{"cna":{"title":"Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Firmware Information Arbitrary File Write Vulnerability","metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"}}],"descriptions":[{"lang":"en","value":"A vulnerability in the directory permissions of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 could allow an unauthenticated, remote attacker to write arbitrary files on an affected device.\r\n\r\nThis vulnerability is due to a lack of proper authentication controls. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to perform arbitrary file writes to specific directories in the underlying operating system.\r\nNote: To exploit this vulnerability, Web Access must be enabled on the phone. Web Access is disabled by default."}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-write-g3kcC5Df","name":"cisco-sa-phone-write-g3kcC5Df"}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"source":{"advisory":"cisco-sa-phone-write-g3kcC5Df","discovery":"INTERNAL","defects":["CSCwn51679"]},"problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Access Control","type":"cwe","cweId":"CWE-284"}]}],"affected":[{"vendor":"Cisco","product":"Cisco Session Initiation Protocol (SIP) Software","versions":[{"version":"12.1(1)SR1","status":"affected"},{"version":"11.5(1)","status":"affected"},{"version":"10.3(2)","status":"affected"},{"version":"10.2(2)","status":"affected"},{"version":"10.3(1)","status":"affected"},{"version":"10.3(1)SR4","status":"affected"},{"version":"11.0(1)","status":"affected"},{"version":"10.4(1)SR2 3rd Party","status":"affected"},{"version":"11.7(1)","status":"affected"},{"version":"12.1(1)","status":"affected"},{"version":"11.0(0.7) MPP","status":"affected"},{"version":"9.3(4) 3rd Party","status":"affected"},{"version":"12.5(1)SR2","status":"affected"},{"version":"10.2(1)SR1","status":"affected"},{"version":"9.3(4)SR3 3rd Party","status":"affected"},{"version":"10.2(1)","status":"affected"},{"version":"12.5(1)","status":"affected"},{"version":"10.3(1)SR2","status":"affected"},{"version":"11-0-1MSR1-1","status":"affected"},{"version":"10.4(1) 3rd Party","status":"affected"},{"version":"12.5(1)SR1","status":"affected"},{"version":"11.5(1)SR1","status":"affected"},{"version":"10.1(1)SR2","status":"affected"},{"version":"12.0(1)SR2","status":"affected"},{"version":"12.6(1)","status":"affected"},{"version":"10.3(1.11) 3rd Party","status":"affected"},{"version":"12.0(1)","status":"affected"},{"version":"12.0(1)SR1","status":"affected"},{"version":"9.3(3)","status":"affected"},{"version":"12.5(1)SR3","status":"affected"},{"version":"10.3(1)SR4b","status":"affected"},{"version":"9.3(4)SR1 3rd Party","status":"affected"},{"version":"10.3(1)SR5","status":"affected"},{"version":"10.1(1.9)","status":"affected"},{"version":"10.3(1.9) 3rd Party","status":"affected"},{"version":"9.3(4)SR2 3rd Party","status":"affected"},{"version":"10.3(1)SR1","status":"affected"},{"version":"10.3(1)SR3","status":"affected"},{"version":"10.1(1)SR1","status":"affected"},{"version":"12.0(1)SR3","status":"affected"},{"version":"12.6(1)SR1","status":"affected"},{"version":"12.7(1)","status":"affected"},{"version":"10.3(1)SR6","status":"affected"},{"version":"12.8(1)","status":"affected"},{"version":"12.7(1)SR1","status":"affected"},{"version":"11.0(2)SR1","status":"affected"},{"version":"11.0(4)","status":"affected"},{"version":"11.0(2)","status":"affected"},{"version":"11.0(4)SR3","status":"affected"},{"version":"11.0(5)","status":"affected"},{"version":"11.0(3)SR2","status":"affected"},{"version":"11.0(3)SR4","status":"affected"},{"version":"11.0(3)SR3","status":"affected"},{"version":"11.0(2)SR2","status":"affected"},{"version":"11.0(4)SR1","status":"affected"},{"version":"11.0(5)SR3","status":"affected"},{"version":"11.0(3)","status":"affected"},{"version":"11.0(5)SR2","status":"affected"},{"version":"11.0(3)SR6","status":"affected"},{"version":"11.0(5)SR1","status":"affected"},{"version":"11.0(4)SR2","status":"affected"},{"version":"11.0(3)SR1","status":"affected"},{"version":"11.0(3)SR5","status":"affected"},{"version":"11.0(6)","status":"affected"},{"version":"12.8(1)SR1","status":"affected"},{"version":"12.8(1)SR2","status":"affected"},{"version":"14.0(1)","status":"affected"},{"version":"14.0(1)SR1","status":"affected"},{"version":"11.0(6)SR1","status":"affected"},{"version":"10.3(1)SR7","status":"affected"},{"version":"14.0(1)SR2","status":"affected"},{"version":"14.1(1)","status":"affected"},{"version":"14.0(1)SR3","status":"affected"},{"version":"11.0(6)SR2","status":"affected"},{"version":"14.1(1)SR1","status":"affected"},{"version":"14.1(1)SR2","status":"affected"},{"version":"11.0(6)SR4","status":"affected"},{"version":"14.2(1)","status":"affected"},{"version":"14.2(1)SR1","status":"affected"},{"version":"11.0(6)SR5","status":"affected"},{"version":"14.1(1)SR3","status":"affected"},{"version":"14.2(1)SR2","status":"affected"},{"version":"3.1(1)","status":"affected"},{"version":"3.0(1)","status":"affected"},{"version":"2.3(1)","status":"affected"},{"version":"2.3(1)SR1","status":"affected"},{"version":"2.2(1)","status":"affected"},{"version":"2.1(1)","status":"affected"},{"version":"2.0(1)","status":"affected"},{"version":"14.2(1)SR3","status":"affected"},{"version":"3.1(1)SR1","status":"affected"},{"version":"14.3(1)","status":"affected"},{"version":"3.2(1)","status":"affected"},{"version":"14.3(1)SR1","status":"affected"},{"version":"14.2(1)SR4","status":"affected"},{"version":"11.0(6)SR6","status":"affected"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2025-09-03T17:41:06.201Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-03T17:56:52.918108Z","id":"CVE-2025-20335","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-03T17:56:55.586Z"}}]}}