First published: Wed Oct 16 2024(Updated: )
A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to view or delete the configuration or change the firmware on an affected device. This vulnerability is due to a lack of authentication on specific HTTP endpoints. An attacker could exploit this vulnerability by browsing to a specific URL. A successful exploit could allow the attacker to view or delete the configuration or change the firmware.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Cisco ATA 191 | <12.0.2 | |
Cisco ATA | ||
All of | ||
Cisco ATA 191 | <11.2.5 | |
Cisco ATA | ||
All of | ||
Cisco ATA 192 | <11.2.5 | |
Cisco ATA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20458 has a high severity rating due to its potential for unauthorized remote access to device configurations.
To mitigate CVE-2024-20458, update affected Cisco ATA 190 Series Analog Telephone Adapter firmware to the latest version released by Cisco.
CVE-2024-20458 specifically affects the Cisco ATA 191 and Cisco ATA 192 models with vulnerable firmware versions.
Yes, CVE-2024-20458 can be exploited by an unauthenticated remote attacker.
An attacker exploiting CVE-2024-20458 could view, delete, or modify configurations and change firmware on the affected devices.