We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-20463

Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection and Denial of Service Vulnerability



Description

A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to modify the configuration or reboot an affected device. This vulnerability is due to the HTTP server allowing state changes in GET requests. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface on an affected device. A successful exploit could allow the attacker to make limited modifications to the configuration or reboot the device, resulting in a denial of service (DoS) condition. 

Reserved 2023-11-08 | Published 2024-10-16 | Updated 2024-10-31 | Assigner cisco


MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

Problem types

Authentication Bypass by Primary Weakness

Product status

Default status
unknown

12.0.1 SR2
affected

11.1.0
affected

12.0.1 SR1
affected

11.1.0 MSR1
affected

12.0.1
affected

11.1.0 MSR2
affected

11.1.0 MSR3
affected

11.1.0 MSR4
affected

12.0.1 SR3
affected

11.2.1
affected

12.0.1 SR4
affected

11.2.2
affected

11.2.2 MSR1
affected

12.0.1 SR5
affected

11.2.3
affected

11.2.4
affected

References

sec.cloudapps.cisco.com/...ry/cisco-sa-ata19x-multi-RDTEqRsy (cisco-sa-ata19x-multi-RDTEqRsy)

cve.org (CVE-2024-20463)

nvd.nist.gov (CVE-2024-20463)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-20463

Support options

Helpdesk Chat, Email, Knowledgebase