First published: Wed Dec 07 2022(Updated: )
Multiple vulnerabilities in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, adjacent attacker to cause Cisco Discovery Protocol memory corruption on an affected device. These vulnerabilities are due to missing length validation checks when processing Cisco Discovery Protocol messages. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read of the valid Cisco Discovery Protocol packet data, which could allow the attacker to cause corruption in the internal Cisco Discovery Protocol database of the affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Ata 190 Firmware | ||
Cisco ATA 190 | ||
Cisco Ata 191 Firmware | <11.2.2 | |
Cisco Ata 191 | ||
Cisco Ata 191 Firmware | <12.0.1 | |
Cisco Ata 191 Firmware | =12.0.1 | |
Cisco Ata 191 Firmware | =12.0.1-sr1 | |
Cisco Ata 191 Firmware | =12.0.1-sr2 | |
Cisco Ata 191 Firmware | =12.0.1-sr3 | |
Cisco Ata 191 Firmware | =12.0.1-sr4 | |
Cisco Ata 191 | ||
Cisco Ata 192 Firmware | <11.2.2 | |
Cisco Ata 192 | ||
All of | ||
Cisco Ata 190 Firmware | ||
Cisco ATA 190 | ||
All of | ||
Cisco Ata 191 Firmware | <11.2.2 | |
Cisco Ata 191 | ||
All of | ||
Any of | ||
Cisco Ata 191 Firmware | <12.0.1 | |
Cisco Ata 191 Firmware | =12.0.1 | |
Cisco Ata 191 Firmware | =12.0.1-sr1 | |
Cisco Ata 191 Firmware | =12.0.1-sr2 | |
Cisco Ata 191 Firmware | =12.0.1-sr3 | |
Cisco Ata 191 Firmware | =12.0.1-sr4 | |
Cisco Ata 191 | ||
All of | ||
Cisco Ata 192 Firmware | <11.2.2 | |
Cisco Ata 192 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.