The Cisco ATA 187 Analog Telephone Adaptor with firmware 9.2.1.0 and 9.2.3.1 before ES build 4 does not properly implement access control, which allows remote attackers to execute operating-system commands via vectors involving a session on TCP port 7870, aka Bug ID CSCtz67038.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130206-ata187 | Vendor Advisory |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130206-ata187 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130206-ata187 - Vendor Advisory |
Information
Published : 2013-02-13 23:55
Updated : 2024-11-21 01:48
NVD link : CVE-2013-1111
Mitre link : CVE-2013-1111
CVE.ORG link : CVE-2013-1111
JSON object : View
Products Affected
cisco
- ata_187_analog_telephone_adaptor_firmware
- ata_187_analog_telephone_adaptor
CWE
CWE-264
Permissions, Privileges, and Access Controls