Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
No history.
Information
Published : 2019-10-16 19:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-15242
Mitre link : CVE-2019-15242
CVE.ORG link : CVE-2019-15242
JSON object : View
Products Affected
cisco
- spa122_firmware
- spa112
- spa112_firmware
- spa122
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer