Multiple vulnerabilities in Cisco SPA Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges.
The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges.
Note: The web-based management interface is enabled by default.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce”]
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | ata_187_analog_telephone_adaptor | any | cpe:2.3:h:cisco:ata_187_analog_telephone_adaptor:any:*:*:*:*:*:*:* |
cisco | spa112_2-port_phone_adapter_firmware | any | cpe:2.3:o:cisco:spa112_2-port_phone_adapter_firmware:any:*:*:*:*:*:*:* |
cisco | ata | any | cpe:2.3:a:cisco:ata:any:*:*:*:*:*:*:* |
cisco | cisco_spa112 | 2-port_phone_adapter | cpe:2.3:a:cisco:cisco_spa112:2-port_phone_adapter:*:*:*:*:*:*:* |