Description
A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser.
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks.
Cisco will not release software updates that address this vulnerability.
{{value}} ["%7b%7bvalue%7d%7d"])}]]
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks.
Cisco will not release software updates that address this vulnerability.
{{value}} ["%7b%7bvalue%7d%7d"])}]]
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-24397 | A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks. Cisco will not release software updates that address this vulnerability. {{value}} ["%7b%7bvalue%7d%7d"])}]] |
References
History
Thu, 17 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Cisco
Subscribe
Spa500ds
Subscribe
Spa500ds Firmware
Subscribe
Spa500s
Subscribe
Spa500s Firmware
Subscribe
Spa501g
Subscribe
Spa501g Firmware
Subscribe
Spa502g
Subscribe
Spa502g Firmware
Subscribe
Spa504g
Subscribe
Spa504g Firmware
Subscribe
Spa508g
Subscribe
Spa508g Firmware
Subscribe
Spa509g
Subscribe
Spa509g Firmware
Subscribe
Spa512g
Subscribe
Spa512g Firmware
Subscribe
Spa514g
Subscribe
Spa514g Firmware
Subscribe
Spa525
Subscribe
Spa525 Firmware
Subscribe
Spa525g
Subscribe
Spa525g2
Subscribe
Spa525g2 Firmware
Subscribe
Spa525g Firmware
Subscribe
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-10-17T14:59:14.948Z
Reserved: 2022-10-27T18:47:50.368Z
Link: CVE-2023-20218
Updated: 2024-08-02T09:05:36.868Z
Status : Modified
Published: 2023-08-03T22:15:11.770
Modified: 2024-11-21T07:40:55.383
Link: CVE-2023-20218
No data.
OpenCVE Enrichment
No data.
EUVD