First published: Wed Oct 16 2024(Updated: )
A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Cisco ATA 191 | <12.0.2 | |
Cisco ATA | ||
All of | ||
Cisco ATA 191 | <11.2.5 | |
Cisco ATA | ||
All of | ||
Cisco ATA 192 | <11.2.5 | |
Cisco ATA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2024-20421 vulnerability is classified as a high severity vulnerability due to the possibility of remote exploitation without authentication.
To mitigate CVE-2024-20421, update the Cisco ATA 190 Series Analog Telephone Adapter firmware to a version that addresses this vulnerability.
CVE-2024-20421 affects the Cisco ATA 191 and ATA 192 Series Analog Telephone Adapters running specific vulnerable firmware versions.
CVE-2024-20421 allows an unauthenticated attacker to perform a cross-site request forgery (CSRF) attack on affected devices.
No, CVE-2024-20421 can be exploited without any authentication, making it more critical.