Security

Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters

.Cisco on Wednesday revealed patches for 8 weakness in the firmware of ATA 190 series analog telephone adapters, consisting of 2 high-severity defects resulting in configuration adjustments and also cross-site demand forgery (CSRF) strikes.Impacting the web-based management user interface of the firmware and also tracked as CVE-2024-20458, the initial bug exists since specific HTTP endpoints are without authentication, enabling remote control, unauthenticated assailants to surf to a specific link as well as view or erase configurations, or tweak the firmware.The 2nd issue, tracked as CVE-2024-20421, enables remote control, unauthenticated assaulters to conduct CSRF attacks as well as do random activities on susceptible tools. An aggressor can easily capitalize on the surveillance issue through encouraging a user to click a crafted web link.Cisco also covered a medium-severity vulnerability (CVE-2024-20459) that might make it possible for distant, verified aggressors to carry out approximate commands along with root benefits.The staying five surveillance flaws, all medium intensity, can be exploited to administer cross-site scripting (XSS) attacks, execute random demands as origin, view passwords, change gadget configurations or reboot the unit, and also operate orders along with supervisor privileges.Depending on to Cisco, ATA 191 (on-premises or even multiplatform) as well as ATA 192 (multiplatform) devices are had an effect on. While there are no workarounds available, disabling the online control user interface in the Cisco ATA 191 on-premises firmware minimizes 6 of the imperfections.Patches for these bugs were consisted of in firmware model 12.0.2 for the ATA 191 analog telephone adapters, and also firmware version 11.2.5 for the ATA 191 and 192 multiplatform analog telephone adapters.On Wednesday, Cisco also announced spots for pair of medium-severity safety flaws in the UCS Central Software application business control solution and the Unified Get In Touch With Center Administration Gateway (Unified CCMP) that could trigger delicate details acknowledgment as well as XSS strikes, respectively.Advertisement. Scroll to continue reading.Cisco makes no mention of any one of these susceptibilities being made use of in the wild. Added information may be located on the firm's safety advisories webpage.Associated: Splunk Organization Update Patches Remote Code Completion Vulnerabilities.Associated: ICS Patch Tuesday: Advisories Published by Siemens, Schneider, Phoenix Contact, CERT@VDE.Connected: Cisco to Get System Knowledge Firm ThousandEyes.Connected: Cisco Patches Vital Susceptabilities in Prime Framework (PRIVATE EYE) Software.

Articles You Can Be Interested In