Lucene search

K
ciscoCiscoCISCO-SA-20191016-SPA-RUNNING-CONFIG
HistoryOct 16, 2019 - 4:00 p.m.

Cisco SPA100 Series Analog Telephone Adapters Running Configuration Information Disclosure Vulnerability

2019-10-1616:00:00
tools.cisco.com
39

0.001 Low

EPSS

Percentile

43.5%

A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to access sensitive information on an affected device.

The vulnerability is due to improper restrictions on configuration information. An attacker could exploit this vulnerability by sending a request to an affected device through the web-based management interface. A successful exploit could allow the attacker to return running configuration information that could also include sensitive information.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-running-config [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-running-config”]

Affected configurations

Vulners
Node
ciscocisco_spa112Matchany
OR
ciscoataMatchany
OR
ciscocisco_spa112Match2-port_phone_adapter
OR
ciscoataMatchany

0.001 Low

EPSS

Percentile

43.5%

Related for CISCO-SA-20191016-SPA-RUNNING-CONFIG