First published: Wed Oct 16 2019(Updated: )
A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to improper restrictions on configuration information. An attacker could exploit this vulnerability by sending a request to an affected device through the web-based management interface. A successful exploit could allow the attacker to return running configuration information that could also include sensitive information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Spa112 Firmware | <1.4.1 | |
Cisco Spa112 Firmware | =1.4.1 | |
Cisco Spa112 Firmware | =1.4.1-sr1 | |
Cisco Spa112 Firmware | =1.4.1-sr2 | |
Cisco Spa112 Firmware | =1.4.1-sr3 | |
Cisco SPA112 | ||
Cisco Spa122 Firmware | <1.4.1 | |
Cisco Spa122 Firmware | =1.4.1 | |
Cisco Spa122 Firmware | =1.4.1-sr1 | |
Cisco Spa122 Firmware | =1.4.1-sr2 | |
Cisco Spa122 Firmware | =1.4.1-sr3 | |
Cisco SPA122 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15257 is a vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) that allows an authenticated, remote attacker to access sensitive information on an affected device.
CVE-2019-15257 has a severity score of 6.5 (medium).
An attacker can exploit CVE-2019-15257 by using improper restrictions on configuration information to access sensitive information on an affected device.
Cisco SPA100 Series Analog Telephone Adapters (ATAs) running certain firmware versions are affected by CVE-2019-15257.
To fix CVE-2019-15257, it is recommended to upgrade the firmware of the Cisco SPA100 Series Analog Telephone Adapters (ATAs) to a version that addresses the vulnerability.