Security

Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters

.Cisco on Wednesday declared patches for eight weakness in the firmware of ATA 190 series analog telephone adapters, including pair of high-severity flaws leading to configuration adjustments and also cross-site demand imitation (CSRF) attacks.Affecting the online monitoring user interface of the firmware and also tracked as CVE-2024-20458, the first bug exists considering that certain HTTP endpoints do not have authorization, allowing remote, unauthenticated attackers to search to a certain URL as well as perspective or delete configurations, or even modify the firmware.The 2nd concern, tracked as CVE-2024-20421, allows distant, unauthenticated attackers to carry out CSRF attacks and execute random activities on at risk tools. An attacker can manipulate the surveillance defect through encouraging a customer to select a crafted hyperlink.Cisco likewise covered a medium-severity vulnerability (CVE-2024-20459) that could possibly make it possible for remote, authenticated assaulters to execute arbitrary orders with origin benefits.The staying five surveillance issues, all tool severity, may be capitalized on to conduct cross-site scripting (XSS) strikes, carry out random demands as root, viewpoint passwords, modify gadget configurations or reboot the device, and also work commands with supervisor benefits.Depending on to Cisco, ATA 191 (on-premises or even multiplatform) as well as ATA 192 (multiplatform) units are had an effect on. While there are actually no workarounds available, disabling the web-based administration user interface in the Cisco ATA 191 on-premises firmware alleviates 6 of the defects.Patches for these bugs were included in firmware model 12.0.2 for the ATA 191 analog telephone adapters, and also firmware version 11.2.5 for the ATA 191 and also 192 multiplatform analog telephone adapters.On Wednesday, Cisco likewise introduced spots for pair of medium-severity security defects in the UCS Central Program business administration remedy as well as the Unified Get In Touch With Center Monitoring Portal (Unified CCMP) that can cause sensitive details acknowledgment as well as XSS attacks, respectively.Advertisement. Scroll to proceed reading.Cisco makes no mention of any one of these weakness being made use of in bush. Additional info could be found on the firm's safety and security advisories webpage.Related: Splunk Venture Update Patches Remote Code Completion Vulnerabilities.Associated: ICS Spot Tuesday: Advisories Released through Siemens, Schneider, Phoenix Call, CERT@VDE.Connected: Cisco to Acquire Network Knowledge Organization ThousandEyes.Connected: Cisco Patches Crucial Susceptibilities in Best Commercial Infrastructure (PI) Software Application.