Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2011-2545


Cross-site scripting (XSS) vulnerability in the SIP implementation on the Cisco SPA8000 and SPA8800 before 6.1.11, SPA2102 and SPA3102 before 5.2.13, and SPA 500 series IP phones before 7.4.9 allows remote attackers to inject arbitrary web script or HTML via the FROM field of an INVITE message, aka Bug IDs CSCtr27277, CSCtr27256, CSCtr27274, and CSCtr14715.


Security Impact Summary

CVE-2011-2545 is a security vulnerability that . Impacting 18 products from cisco, from cisco, from cisco and 15 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Documented in 2012, this vulnerability occurred amid the cloud computing expansion era, where traditional network perimeter security models were being reevaluated. Organizations were transitioning from isolated infrastructure to interconnected systems, creating new attack surfaces that vulnerabilities like this could exploit.


Published

2012-06-13T20:55:01.707

Last Modified

2026-04-29T01:13:23.040

Status

Modified

Source

[email protected]

Severity

CVSSv2: 4.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco spa8000_8-port_ip_telephony_gateway_firmware ≤ 6.1.10 Yes
Operating System cisco spa8000_8-port_ip_telephony_gateway_firmware 5.1.12 Yes
Operating System cisco spa8000_8-port_ip_telephony_gateway_firmware 6.1.3 Yes
Hardware cisco spa8000_8-port_ip_telephony_gateway - Yes
Operating System cisco spa8800_8-port_ip_telephony_gateway_firmware ≤ 6.1.7 Yes
Hardware cisco spa8800_ip_telephony_gateway - Yes
Operating System cisco spa2102_phone_adapter_with_router_firmware ≤ 5.2.12 Yes
Operating System cisco spa2102_phone_adapter_with_router_firmware 5.2.3 Yes
Operating System cisco spa2102_phone_adapter_with_router_firmware 5.2.5 Yes
Operating System cisco spa2102_phone_adapter_with_router_firmware 5.2.10 Yes
Hardware cisco spa2102_phone_adapter_with_router - Yes
Operating System cisco spa3102_voice_gateway_with_router_firmware ≤ 5.1.10 Yes
Operating System cisco spa3102_voice_gateway_with_router_firmware 3.3.6 Yes
Operating System cisco spa3102_voice_gateway_with_router_firmware 5.1.7 Yes
Hardware cisco spa3102_voice_gateway_with_router - Yes
Operating System cisco spa_500_series_ip_phone_firmware ≤ 7.4.8 Yes
Operating System cisco spa_500_series_ip_phone_firmware 7.3.7 Yes
Operating System cisco spa_500_series_ip_phone_firmware 7.4.3 Yes
Operating System cisco spa_500_series_ip_phone_firmware 7.4.4 Yes
Operating System cisco spa_500_series_ip_phone_firmware 7.4.6 Yes
Operating System cisco spa_500_series_ip_phone_firmware 7.4.7 Yes
Hardware cisco spa_501g_8-line_ip_phone * Yes
Hardware cisco spa_502g_1-line_ip_phone * Yes
Hardware cisco spa_504g_4-line_ip_phone * Yes
Hardware cisco spa_508g_8-line_ip_phone * Yes
Hardware cisco spa_509g_12-line_ip_phone * Yes
Hardware cisco spa_512g_1-line_ip_phone * Yes
Hardware cisco spa_514g_4-line_ip_phone * Yes
Hardware cisco spa_525g_5-line_ip_phone * Yes
Hardware cisco spa_525g2_5-line_ip_phone * Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For cisco's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.