First published: Wed Oct 16 2024(Updated: )
A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Cisco Ata 191 Firmware | <12.0.2 | |
Cisco Ata 191 | ||
All of | ||
Cisco Ata 191 Firmware | <11.2.5 | |
Cisco Ata 191 | ||
All of | ||
Cisco Ata 192 Firmware | <11.2.5 | |
Cisco Ata 192 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.