First published: Wed Oct 16 2024(Updated: )
A vulnerability in the web-based management interface of Cisco ATA 190 Series Multiplatform Analog Telephone Adapter firmware could allow an authenticated, local attacker with low privileges to view passwords on an affected device. This vulnerability is due to incorrect sanitization of HTML content from an affected device. A successful exploit could allow the attacker to view passwords that belong to other users.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Cisco ATA 191 | <12.0.2 | |
Cisco ATA | ||
All of | ||
Cisco ATA 191 | <11.2.5 | |
Cisco ATA | ||
All of | ||
Cisco ATA 192 | <11.2.5 | |
Cisco ATA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20462 is considered a low severity vulnerability as it impacts local authenticated users with low privileges.
To remediate CVE-2024-20462, you should upgrade the Cisco ATA 190 Series Multiplatform Analog Telephone Adapter firmware to the latest version that addresses this vulnerability.
CVE-2024-20462 affects users of the Cisco ATA 191 and ATA 192 firmware versions below 12.0.2 and 11.2.5 respectively.
Exploitation of CVE-2024-20462 requires authenticated local access to the affected device.
CVE-2024-20462 is due to incorrect sanitization in the web-based management interface that allows password viewing.