First published: Wed Oct 16 2019(Updated: )
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Spa112 Firmware | <1.4.1 | |
Cisco Spa112 Firmware | =1.4.1 | |
Cisco Spa112 Firmware | =1.4.1-sr1 | |
Cisco Spa112 Firmware | =1.4.1-sr2 | |
Cisco Spa112 Firmware | =1.4.1-sr3 | |
Cisco Spa112 Firmware | =1.4.1-sr4 | |
Cisco SPA112 | ||
Cisco Spa122 Firmware | <1.4.1 | |
Cisco Spa122 Firmware | =1.4.1 | |
Cisco Spa122 Firmware | =1.4.1-sr1 | |
Cisco Spa122 Firmware | =1.4.1-sr2 | |
Cisco Spa122 Firmware | =1.4.1-sr3 | |
Cisco Spa122 Firmware | =1.4.1-sr4 | |
Cisco SPA122 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15240 is a vulnerability in Cisco SPA100 Series Analog Telephone Adapters (ATAs) that allows an authenticated, adjacent attacker to execute arbitrary code with elevated privileges.
CVE-2019-15240 is categorized as high severity with a severity value of 8.
The affected software for CVE-2019-15240 includes Cisco Spa112 Firmware versions up to and including 1.4.1, and Cisco Spa122 Firmware versions up to and including 1.4.1.
An attacker can exploit CVE-2019-15240 by sending malicious input to the web-based management interface of the affected Cisco SPA100 Series Analog Telephone Adapters (ATAs).
You can find more information about CVE-2019-15240 in the Cisco Security Advisory at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce