First published: Wed Oct 16 2024(Updated: )
A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information on an affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Cisco ATA 191 | <12.0.2 | |
Cisco ATA | ||
All of | ||
Cisco ATA 191 | <11.2.5 | |
Cisco ATA | ||
All of | ||
Cisco ATA 192 | <11.2.5 | |
Cisco ATA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20460 has a high severity rating due to its potential to allow unauthenticated remote attackers to execute reflected cross-site scripting attacks.
To mitigate CVE-2024-20460, users should upgrade to the latest firmware version for the Cisco ATA 191 and ATA 192 series devices.
CVE-2024-20460 affects Cisco ATA 191 and ATA 192 series Analog Telephone Adapters running specific vulnerable firmware versions.
Yes, CVE-2024-20460 can be exploited by remote attackers without authentication, targeting the web-based management interface.
CVE-2024-20460 enables reflected cross-site scripting (XSS) attacks against users interacting with the vulnerable management interface.