First published: Wed Oct 16 2019(Updated: )
A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to view the contents of arbitrary files on an affected device. The vulnerability is due to improper input validation in the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve the contents of arbitrary files on the device, possibly resulting in the disclosure of sensitive information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Spa112 Firmware | <1.4.1 | |
Cisco Spa112 Firmware | =1.4.1 | |
Cisco Spa112 Firmware | =1.4.1-sr1 | |
Cisco Spa112 Firmware | =1.4.1-sr2 | |
Cisco Spa112 Firmware | =1.4.1-sr3 | |
Cisco SPA112 | ||
Cisco Spa122 Firmware | <1.4.1 | |
Cisco Spa122 Firmware | =1.4.1 | |
Cisco Spa122 Firmware | =1.4.1-sr1 | |
Cisco Spa122 Firmware | =1.4.1-sr2 | |
Cisco Spa122 Firmware | =1.4.1-sr3 | |
Cisco SPA122 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Cisco SPA100 Series Analog Telephone Adapter vulnerability is CVE-2019-12704.
The severity level of CVE-2019-12704 is medium with a severity value of 6.5.
An authenticated, remote attacker can exploit this vulnerability by viewing the contents of arbitrary files on an affected device.
The Cisco SPA112 Firmware versions up to and including 1.4.1 are affected by this vulnerability.
To fix the vulnerability, you should upgrade to a version of the Cisco SPA112 Firmware that is higher than 1.4.1.