A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser.

This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks.

Cisco will not release software updates that address this vulnerability.

{{value}} ["%7b%7bvalue%7d%7d"])}]]

Project Subscriptions

Vendors Products
Spa500ds Subscribe
Spa500ds Firmware Subscribe
Spa500s Subscribe
Spa500s Firmware Subscribe
Spa501g Subscribe
Spa501g Firmware Subscribe
Spa502g Subscribe
Spa502g Firmware Subscribe
Spa504g Subscribe
Spa504g Firmware Subscribe
Spa508g Subscribe
Spa508g Firmware Subscribe
Spa509g Subscribe
Spa509g Firmware Subscribe
Spa512g Subscribe
Spa512g Firmware Subscribe
Spa514g Subscribe
Spa514g Firmware Subscribe
Spa525 Firmware Subscribe
Spa525g Subscribe
Spa525g2 Subscribe
Spa525g2 Firmware Subscribe
Spa525g Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-24397 A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks. Cisco will not release software updates that address this vulnerability. {{value}} ["%7b%7bvalue%7d%7d"])}]]
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 17 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-10-17T14:59:14.948Z

Reserved: 2022-10-27T18:47:50.368Z

Link: CVE-2023-20218

cve-icon Vulnrichment

Updated: 2024-08-02T09:05:36.868Z

cve-icon NVD

Status : Modified

Published: 2023-08-03T22:15:11.770

Modified: 2024-11-21T07:40:55.383

Link: CVE-2023-20218

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses