Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 04:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rceĀ - Vendor Advisory |
Information
Published : 2019-10-16 19:15
Updated : 2024-11-21 04:28
NVD link : CVE-2019-15244
Mitre link : CVE-2019-15244
CVE.ORG link : CVE-2019-15244
JSON object : View
Products Affected
cisco
- spa122_firmware
- spa112_firmware
- spa112
- spa122
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer