6.5
MEDIUM CVSS 3.1
CVE-2021-1379
Cisco IP Phones Cisco Discovery Protocol and Link Layer Discovery Protocol Remote Code Execution and Denial of Service Vulnerabilities
Description

Multiple vulnerabilities in the Cisco Discovery Protocol and Link Layer Discovery Protocol (LLDP) implementations for Cisco IP Phone Series 68xx/78xx/88xx could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP phone. These vulnerabilities are due to missing checks when the IP phone processes a Cisco Discovery Protocol or LLDP packet. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted IP phone. A successful exploit could allow the attacker to execute code on the affected IP phone or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition.Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

INFO

Published Date :

Nov. 18, 2024, 4:15 p.m.

Last Modified :

Jan. 6, 2026, 5:30 p.m.

Remotely Exploit :

No
Affected Products

The following products are affected by CVE-2021-1379 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Cisco ip_conference_phone_8832_firmware
2 Cisco ip_phone_7811_firmware
3 Cisco ip_phone_7821_firmware
4 Cisco ip_phone_7841_firmware
5 Cisco ip_phone_7861_firmware
6 Cisco ip_phone_8811_firmware
7 Cisco ip_phone_8841_firmware
8 Cisco ip_phone_8845_firmware
9 Cisco ip_phone_8851_firmware
10 Cisco ip_phone_8861_firmware
11 Cisco ip_phone_8865_firmware
12 Cisco wireless_ip_phone_8821_firmware
13 Cisco wireless_ip_phone_8821-ex_firmware
14 Cisco ip_conference_phone_7832_firmware
15 Cisco spa525g_firmware
16 Cisco ip_phone_8811_with_multiplatform_firmware
17 Cisco ip_phone_8841_with_multiplatform_firmware
18 Cisco ip_phone_8845_with_multiplatform_firmware
19 Cisco ip_phone_8851_with_multiplatform_firmware
20 Cisco ip_phone_8861_with_multiplatform_firmware
21 Cisco ip_phone_8865_with_multiplatform_firmware
22 Cisco ip_conference_phone_7832_with_multiplatform_firmware
23 Cisco ip_conference_phone_8832_with_multiplatform_firmware
24 Cisco ip_phone_7811_with_multiplatform_firmware
25 Cisco ip_phone_7821_with_multiplatform_firmware
26 Cisco ip_phone_7841_with_multiplatform_firmware
27 Cisco ip_phone_7861_with_multiplatform_firmware
28 Cisco unified_ip_conference_phone_8831_firmware
29 Cisco unified_ip_conference_phone_8831_for_third-party_call_control_firmware
30 Cisco ip_phone_6821_with_multiplatform_firmware
31 Cisco ip_phone_6841_with_multiplatform_firmware
32 Cisco ip_phone_6851_with_multiplatform_firmware
33 Cisco ip_phone_6861_with_multiplatform_firmware
34 Cisco ip_phone_6871_with_multiplatform_firmware
35 Cisco ip_phone_7861
36 Cisco ip_phone_8851
37 Cisco ip_phone_6841
38 Cisco ip_phone_6851
39 Cisco ip_phone_7811
40 Cisco ip_phone_7821
41 Cisco ip_phone_7841
42 Cisco ip_phone_8811
43 Cisco ip_phone_8841
44 Cisco ip_phone_8845
45 Cisco ip_phone_8861
46 Cisco ip_phone_8865
47 Cisco ip_conference_phone_7832
48 Cisco ip_conference_phone_8832
49 Cisco spa525g
50 Cisco wireless_ip_phone_8821
51 Cisco wireless_ip_phone_8821-ex
52 Cisco ip_phone_6861
53 Cisco ip_phone_6871
54 Cisco ip_phone_6821
55 Cisco unified_ip_conference_phone_8831
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-1379.

URL Resource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-rce-dos-U2PsSkz3 Vendor Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3 Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-1379 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-1379 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-1379 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Jan. 06, 2026

    Action Type Old Value New Value
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.8(1) *cpe:2.3:o:cisco:ip_conference_phone_7832_firmware:12.8(1):-:*:*:*:*:*:* *cpe:2.3:o:cisco:ip_conference_phone_7832_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.8(1) *cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:12.8(1):-:*:*:*:*:*:* *cpe:2.3:o:cisco:ip_conference_phone_8832_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_6821_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_phone_6821:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_6841_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_phone_6841:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_6851_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_phone_6851:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_6861_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_6871_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_phone_6871:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.8(1) *cpe:2.3:o:cisco:ip_phone_7811_firmware:12.8(1):-:*:*:*:*:*:* *cpe:2.3:o:cisco:ip_phone_7811_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.8(1) *cpe:2.3:o:cisco:ip_phone_7821_firmware:12.8(1):-:*:*:*:*:*:* *cpe:2.3:o:cisco:ip_phone_7821_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.8(1) *cpe:2.3:o:cisco:ip_phone_7841_firmware:12.8(1):-:*:*:*:*:*:* *cpe:2.3:o:cisco:ip_phone_7841_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.8(1) *cpe:2.3:o:cisco:ip_phone_7861_firmware:12.8(1):-:*:*:*:*:*:* *cpe:2.3:o:cisco:ip_phone_7861_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.8(1) *cpe:2.3:o:cisco:ip_phone_8811_firmware:12.8(1):-:*:*:*:*:*:* *cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.8(1) *cpe:2.3:o:cisco:ip_phone_8841_firmware:12.8(1):-:*:*:*:*:*:* *cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.8(1) *cpe:2.3:o:cisco:ip_phone_8851_firmware:12.8(1):-:*:*:*:*:*:* *cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) OR cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) *cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.8(1) *cpe:2.3:o:cisco:ip_phone_8861_firmware:12.8(1):-:*:*:*:*:*:* OR cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) *cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.8(1) *cpe:2.3:o:cisco:ip_phone_8845_firmware:12.8(1):-:*:*:*:*:*:* OR cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.3(2) *cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.8(1) *cpe:2.3:o:cisco:ip_phone_8865_firmware:12.8(1):-:*:*:*:*:*:* OR cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:unified_ip_conference_phone_8831_for_third-party_call_control_firmware:-:*:*:*:*:*:*:* *cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 10.3(1) *cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:10.3(1):-:*:*:*:*:*:* *cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:10.3(1):sr1:*:*:*:*:*:* *cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:10.3(1):sr2:*:*:*:*:*:* *cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:10.3(1):sr3:*:*:*:*:*:* *cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:10.3(1):sr4b:*:*:*:*:*:* *cpe:2.3:o:cisco:unified_ip_conference_phone_8831_firmware:10.3(1):sr6:*:*:*:*:*:* OR cpe:2.3:h:cisco:unified_ip_conference_phone_8831:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.0(6.6) OR cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 11.0(6.6) OR cpe:2.3:h:cisco:wireless_ip_phone_8821-ex:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:spa525g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:cisco:spa525g:-:*:*:*:*:*:*:*
    Added Reference Type Cisco Systems, Inc.: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-rce-dos-U2PsSkz3 Types: Vendor Advisory
    Added Reference Type Cisco Systems, Inc.: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3 Types: Vendor Advisory
  • CVE Received by [email protected]

    Nov. 18, 2024

    Action Type Old Value New Value
    Added Description Multiple vulnerabilities in the Cisco Discovery Protocol and Link Layer Discovery Protocol (LLDP) implementations for Cisco IP Phone Series 68xx/78xx/88xx could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP phone. These vulnerabilities are due to missing checks when the IP phone processes a Cisco Discovery Protocol or LLDP packet. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol or LLDP packet to the targeted IP phone. A successful exploit could allow the attacker to execute code on the affected IP phone or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition.Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
    Added Reference Cisco Systems, Inc. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-rce-dos-U2PsSkz3 [No types assigned]
    Added Reference Cisco Systems, Inc. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3 [No types assigned]
    Added CWE Cisco Systems, Inc. CWE-120
    Added CVSS V3.1 Cisco Systems, Inc. AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 6.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact