8.8
CWE
1284 130
Advisory Published
Updated

CVE-2022-20689

First published: Wed Dec 07 2022(Updated: )

Multiple vulnerabilities in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, adjacent attacker to cause Cisco Discovery Protocol memory corruption on an affected device. These vulnerabilities are due to missing length validation checks when processing Cisco Discovery Protocol messages. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read of the valid Cisco Discovery Protocol packet data, which could allow the attacker to cause corruption in the internal Cisco Discovery Protocol database of the affected device.

Credit: ykramarz@cisco.com ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
All of
Cisco ATA 190 firmware
Cisco ATA 190 Series Analog Telephone Adapter
All of
Cisco ATA 191<11.2.2
Cisco ATA
All of
Any of
Cisco ATA 191<12.0.1
Cisco ATA 191=12.0.1
Cisco ATA 191=12.0.1-sr1
Cisco ATA 191=12.0.1-sr2
Cisco ATA 191=12.0.1-sr3
Cisco ATA 191=12.0.1-sr4
Cisco ATA
All of
Cisco ATA 192<11.2.2
Cisco ATA
Cisco ATA 190 firmware
Cisco ATA 190 Series Analog Telephone Adapter
Cisco ATA 191<11.2.2
Cisco ATA
Cisco ATA 191<12.0.1
Cisco ATA 191=12.0.1
Cisco ATA 191=12.0.1-sr1
Cisco ATA 191=12.0.1-sr2
Cisco ATA 191=12.0.1-sr3
Cisco ATA 191=12.0.1-sr4
Cisco ATA
Cisco ATA 192<11.2.2
Cisco ATA

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-20689?

    CVE-2022-20689 has been rated with a critical severity level, indicating that it poses a significant risk to affected devices.

  • How do I fix CVE-2022-20689?

    To mitigate CVE-2022-20689, update the Cisco ATA 190 firmware to the latest version provided by Cisco.

  • Who is affected by CVE-2022-20689?

    CVE-2022-20689 affects users of the Cisco ATA 190 Series Analog Telephone Adapter with vulnerable firmware versions.

  • What type of vulnerability is CVE-2022-20689?

    CVE-2022-20689 is a memory corruption vulnerability in the Cisco Discovery Protocol functionality.

  • Can CVE-2022-20689 be exploited remotely?

    CVE-2022-20689 requires an unauthenticated, adjacent attacker to exploit the vulnerability, which limits its remote exploitability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203