Cisco IP Phones Improper Neutralization of Input During Web Page Generation (CVE-2025-20351)

medium Tenable OT Security Plugin ID 504993

Synopsis

The remote OT asset is affected by a vulnerability.

Description

A vulnerability in the web UI of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 running Cisco SIP Software could allow an unauthenticated, remote attacker to conduct XSS attacks against a user of the web UI. This vulnerability exists because the web UI of an affected device does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Note: To exploit this vulnerability, the phone must be registered to Cisco Unified Communications Manager and have Web Access enabled. Web Access is disabled by default.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

http://www.nessus.org/u?83c0dd77

Plugin Details

Severity: Medium

ID: 504993

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 1/19/2026

Updated: 1/19/2026

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Vulnerability Information

CPE: cpe:/o:cisco:ip_phone_8821_firmware:11.0%285%29, cpe:/o:cisco:ip_phone_8821_firmware:11.0%286%29:sr4, cpe:/o:cisco:ip_phone_8845_firmware:14.3%281%29, cpe:/o:cisco:ip_phone_7811_firmware:14.3%281%29, cpe:/o:cisco:ip_phone_8811_firmware:14.3%281%29:sr1, cpe:/o:cisco:ip_phone_8865_firmware:14.3%281%29, cpe:/o:cisco:ip_phone_8821_firmware:11.0%284%29:sr2, cpe:/o:cisco:ip_phone_8851_firmware, cpe:/o:cisco:ip_phone_7861_firmware, cpe:/o:cisco:ip_phone_7861_firmware:14.3%281%29, cpe:/o:cisco:ip_phone_8861_firmware, cpe:/o:cisco:ip_phone_8821_firmware:11.0%282%29:sr2, cpe:/o:cisco:ip_phone_8821_firmware:11.0%283%29, cpe:/o:cisco:ip_phone_8821_firmware:11.0%285%29:sr1, cpe:/o:cisco:ip_phone_8861_firmware:14.3%281%29:sr1, cpe:/o:cisco:ip_phone_8821_firmware:11.0%284%29:sr3, cpe:/o:cisco:ip_phone_7821_firmware:14.3%281%29:sr1, cpe:/o:cisco:ip_phone_7811_firmware:14.3%281%29:sr1, cpe:/o:cisco:ip_phone_8811_firmware:14.3%281%29, cpe:/o:cisco:ip_phone_8821_firmware:11.0%286%29:sr1, cpe:/o:cisco:ip_phone_8821_firmware:11.0%283%29:sr5, cpe:/o:cisco:ip_phone_8865_firmware, cpe:/o:cisco:ip_phone_8821_firmware, cpe:/o:cisco:ip_phone_8821_firmware:11.0%286%29:sr2, cpe:/o:cisco:ip_phone_8821_firmware:11.0%282%29:sr1, cpe:/o:cisco:ip_phone_8821_firmware:11.0%286%29:sr5, cpe:/o:cisco:ip_phone_8821_firmware:11.0%280.7%29:mpp, cpe:/o:cisco:ip_phone_8821_firmware:11.0%282%29, cpe:/o:cisco:ip_phone_8821_firmware:11.0%283%29:sr4, cpe:/o:cisco:ip_phone_8832_firmware, cpe:/o:cisco:ip_phone_7821_firmware, cpe:/o:cisco:ip_phone_8832_firmware:14.3%281%29:sr1, cpe:/o:cisco:ip_phone_7841_firmware, cpe:/o:cisco:ip_phone_8821_firmware:11.0%284%29:sr1, cpe:/o:cisco:ip_phone_8821_firmware:11.0%285%29:sr2, cpe:/o:cisco:ip_phone_8821_firmware:11.0%281%29, cpe:/o:cisco:ip_phone_8821_firmware:11.0%283%29:sr3, cpe:/o:cisco:ip_phone_8845_firmware, cpe:/o:cisco:ip_phone_8821_firmware:11.0%286%29:sr6, cpe:/o:cisco:ip_phone_8841_firmware:14.3%281%29:sr1, cpe:/o:cisco:ip_phone_7841_firmware:14.3%281%29:sr1, cpe:/o:cisco:ip_phone_8861_firmware:14.3%281%29, cpe:/o:cisco:ip_phone_8832_firmware:14.3%281%29, cpe:/o:cisco:ip_phone_8811_firmware, cpe:/o:cisco:ip_phone_8865_firmware:14.3%281%29:sr1, cpe:/o:cisco:ip_phone_8841_firmware, cpe:/o:cisco:ip_phone_7821_firmware:14.3%281%29, cpe:/o:cisco:ip_phone_8821_firmware:11.0%283%29:sr2, cpe:/o:cisco:ip_phone_8841_firmware:14.3%281%29, cpe:/o:cisco:ip_phone_8821_firmware:11.0%283%29:sr6, cpe:/o:cisco:ip_phone_8845_firmware:14.3%281%29:sr1, cpe:/o:cisco:ip_phone_8851_firmware:14.3%281%29, cpe:/o:cisco:ip_phone_8851_firmware:14.3%281%29:sr1, cpe:/o:cisco:ip_phone_8821_firmware:11.0%283%29:sr1, cpe:/o:cisco:ip_phone_8821_firmware:11.0%284%29, cpe:/o:cisco:ip_phone_8821_firmware:11.0%285%29:sr3, cpe:/o:cisco:ip_phone_7841_firmware:14.3%281%29, cpe:/o:cisco:ip_phone_7811_firmware, cpe:/o:cisco:ip_phone_8821_firmware:11.0%286%29, cpe:/o:cisco:ip_phone_7861_firmware:14.3%281%29:sr1

Required KB Items: Tenable.ot/Cisco

Patch Publication Date: 10/15/2025

Vulnerability Publication Date: 10/15/2025

Reference Information

CVE: CVE-2025-20351

CWE: 79