Security

Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters

.Cisco on Wednesday declared spots for eight susceptabilities in the firmware of ATA 190 set analog telephone adapters, consisting of pair of high-severity problems triggering configuration adjustments as well as cross-site request bogus (CSRF) strikes.Affecting the web-based control user interface of the firmware and tracked as CVE-2024-20458, the initial bug exists considering that specific HTTP endpoints are without authorization, permitting remote, unauthenticated assailants to search to a details URL and also viewpoint or even delete configurations, or modify the firmware.The second concern, tracked as CVE-2024-20421, allows remote control, unauthenticated enemies to administer CSRF strikes and also do arbitrary actions on prone devices. An aggressor can manipulate the protection issue through convincing an individual to click on a crafted link.Cisco likewise covered a medium-severity susceptibility (CVE-2024-20459) that can permit distant, verified attackers to perform arbitrary demands with origin advantages.The staying 5 security flaws, all channel severeness, can be manipulated to carry out cross-site scripting (XSS) assaults, implement arbitrary commands as origin, viewpoint security passwords, change tool configurations or reboot the gadget, as well as work demands along with administrator advantages.Depending on to Cisco, ATA 191 (on-premises or even multiplatform) and ATA 192 (multiplatform) units are actually affected. While there are no workarounds on call, disabling the web-based management interface in the Cisco ATA 191 on-premises firmware relieves six of the defects.Patches for these bugs were featured in firmware variation 12.0.2 for the ATA 191 analog telephone adapters, and firmware model 11.2.5 for the ATA 191 and 192 multiplatform analog telephone adapters.On Wednesday, Cisco additionally introduced patches for pair of medium-severity surveillance problems in the UCS Central Software application company control answer as well as the Unified Contact Facility Control Gateway (Unified CCMP) that could possibly result in delicate details acknowledgment as well as XSS assaults, respectively.Advertisement. Scroll to carry on reading.Cisco makes no acknowledgment of any one of these weakness being made use of in the wild. Extra information can be discovered on the firm's protection advisories webpage.Associated: Splunk Company Update Patches Remote Code Completion Vulnerabilities.Related: ICS Spot Tuesday: Advisories Published through Siemens, Schneider, Phoenix Metro Connect With, CERT@VDE.Related: Cisco to Purchase Network Knowledge Organization ThousandEyes.Related: Cisco Patches Critical Susceptabilities in Prime Structure (PRIVATE EYE) Software Program.

Articles You Can Be Interested In