Pingtel Xpressa 1.2.5 through 2.0.1 uses predictable (1) Call-ID, (2) CSeq, and (3) "To" and "From" SIP URL values in a Session Identification Protocol (SIP) request, which allows remote attackers to avoid registering with the SIP registrar.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    20 Nov 2024, 23:42
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://online.securityfocus.com/archive/1/288383 - | |
| References | () http://www.iss.net/security_center/static/9949.php - | |
| References | () http://www.securityfocus.com/bid/5537 - | |
| References | () http://www.sys-security.com/archive/advisories/More_Vulnerabilities_with_Pingtel_xpressa_SIP-based_IP_phones.txt - Vendor Advisory, URL Repurposed | 
14 Feb 2024, 01:17
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) http://www.sys-security.com/archive/advisories/More_Vulnerabilities_with_Pingtel_xpressa_SIP-based_IP_phones.txt - Vendor Advisory, URL Repurposed | 
Information
                Published : 2002-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2002-1935
Mitre link : CVE-2002-1935
CVE.ORG link : CVE-2002-1935
JSON object : View
Products Affected
                pingtel
- xpressa
CWE
                