A vulnerability in the web-based management interface of Cisco ATA 190 Multiplatform Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with high privileges to execute arbitrary commands as the root user on the underlying operating system.
This vulnerability is due to a lack of input sanitization in the web-based management interface. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Oct 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco ata 191
Cisco ata 191 Firmware Cisco ata 192 Cisco ata 192 Firmware |
|
CPEs | cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:* cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:* cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:* cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Cisco ata 191
Cisco ata 191 Firmware Cisco ata 192 Cisco ata 192 Firmware |
Wed, 16 Oct 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco ata 190 Firmware |
|
CPEs | cpe:2.3:o:cisco:ata_190_firmware:11.1.0:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr2:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr3:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr4:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:11.2.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:11.2.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:11.2.2_msr1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:11.2.3:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:11.2.4:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr2:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr3:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr4:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr5:*:*:*:*:*:*:* cpe:2.3:o:cisco:ata_190_firmware:121.0.1:*:*:*:*:*:*:* |
|
Vendors & Products |
Cisco
Cisco ata 190 Firmware |
|
Metrics |
ssvc
|
Wed, 16 Oct 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the web-based management interface of Cisco ATA 190 Multiplatform Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with high privileges to execute arbitrary commands as the root user on the underlying operating system. This vulnerability is due to a lack of input sanitization in the web-based management interface. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user. | |
Title | Cisco ATA 190 Series Analog Telephone Adapter Muliplatform Firmware Command Injection Vulnerability | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2024-10-16T16:16:12.834Z
Updated: 2024-10-16T17:56:02.319Z
Reserved: 2023-11-08T15:08:07.679Z
Link: CVE-2024-20459
Vulnrichment
Updated: 2024-10-16T17:55:57.437Z
NVD
Status : Analyzed
Published: 2024-10-16T17:15:14.657
Modified: 2024-10-22T18:06:48.333
Link: CVE-2024-20459
Redhat
No data.