A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to unsafe handling of user credentials. An attacker could exploit this vulnerability by viewing portions of the web-based management interface of an affected device. A successful exploit could allow the attacker to access administrative credentials and potentially gain elevated privileges by reusing stolen credentials on the affected device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-credentials | Vendor Advisory |
https://www.tenable.com/security/research/tra-2019-44 | Third Party Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-credentials | Vendor Advisory |
https://www.tenable.com/security/research/tra-2019-44 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-credentials - Vendor Advisory | |
References | () https://www.tenable.com/security/research/tra-2019-44 - Third Party Advisory |
Information
Published : 2019-10-16 19:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12708
Mitre link : CVE-2019-12708
CVE.ORG link : CVE-2019-12708
JSON object : View
Products Affected
cisco
- spa122_firmware
- spa112_firmware
- spa112
- spa122
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor