A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser.
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks.
Cisco will not release software updates that address this vulnerability.
{{value}} ["%7b%7bvalue%7d%7d"])}]]
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks.
Cisco will not release software updates that address this vulnerability.
{{value}} ["%7b%7bvalue%7d%7d"])}]]
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Spa500ds
Subscribe
Spa500ds Firmware
Subscribe
Spa500s
Subscribe
Spa500s Firmware
Subscribe
Spa501g
Subscribe
Spa501g Firmware
Subscribe
Spa502g
Subscribe
Spa502g Firmware
Subscribe
Spa504g
Subscribe
Spa504g Firmware
Subscribe
Spa508g
Subscribe
Spa508g Firmware
Subscribe
Spa509g
Subscribe
Spa509g Firmware
Subscribe
Spa512g
Subscribe
Spa512g Firmware
Subscribe
Spa514g
Subscribe
Spa514g Firmware
Subscribe
Spa525
Subscribe
Spa525 Firmware
Subscribe
Spa525g
Subscribe
Spa525g2
Subscribe
Spa525g2 Firmware
Subscribe
Spa525g Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-24397 | A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks. Cisco will not release software updates that address this vulnerability. {{value}} ["%7b%7bvalue%7d%7d"])}]] |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 17 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-10-17T14:59:14.948Z
Reserved: 2022-10-27T18:47:50.368Z
Link: CVE-2023-20218
Updated: 2024-08-02T09:05:36.868Z
Status : Modified
Published: 2023-08-03T22:15:11.770
Modified: 2024-11-21T07:40:55.383
Link: CVE-2023-20218
No data.
OpenCVE Enrichment
No data.
EUVD