First published: Wed Oct 16 2024(Updated: )
A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with low privileges to run commands as an Admin user. This vulnerability is due to incorrect authorization verification by the HTTP server. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to run commands as the Admin user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Cisco ATA 191 | <12.0.2 | |
Cisco ATA | ||
All of | ||
Cisco ATA 191 | <11.2.5 | |
Cisco ATA | ||
All of | ||
Cisco ATA 192 | <11.2.5 | |
Cisco ATA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20420 is rated as a medium severity vulnerability due to its potential for authenticated, remote exploitation.
To mitigate CVE-2024-20420, users should upgrade their Cisco ATA 190 Series Analog Telephone Adapter firmware to a version that addresses the vulnerability.
CVE-2024-20420 affects the Cisco ATA 191 and Cisco ATA 192 series devices running specific vulnerable firmware versions.
Yes, CVE-2024-20420 can be exploited remotely by an authenticated attacker with low privileges.
CVE-2024-20420 could allow an attacker to execute commands with Admin privileges due to improper authorization controls.