First published: Wed May 03 2023(Updated: )
A vulnerability in the web-based management interface of Cisco SPA112 2-Port Phone Adapters could allow an unauthenticated, remote attacker to execute arbitrary code on an
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SPA112 2-Port Phone Adapter Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-spa-unauth-upgrade-UqhyTWW is considered high due to the potential for unauthenticated remote code execution.
To fix cisco-sa-spa-unauth-upgrade-UqhyTWW, users should upgrade their Cisco SPA112 2-Port Phone Adapter to the latest firmware version provided by Cisco.
cisco-sa-spa-unauth-upgrade-UqhyTWW can be exploited by unauthenticated, remote attackers who aim to execute arbitrary code.
cisco-sa-spa-unauth-upgrade-UqhyTWW specifically affects the Cisco SPA112 2-Port Phone Adapter.
No, authentication is not required for the exploit in cisco-sa-spa-unauth-upgrade-UqhyTWW, making it easier for attackers to compromise the device.