Security

Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters

.Cisco on Wednesday introduced patches for 8 vulnerabilities in the firmware of ATA 190 set analog telephone adapters, consisting of 2 high-severity imperfections resulting in configuration adjustments and cross-site ask for forgery (CSRF) strikes.Influencing the online control interface of the firmware and tracked as CVE-2024-20458, the first bug exists since specific HTTP endpoints do not have authentication, allowing remote control, unauthenticated enemies to scan to a details URL as well as viewpoint or remove configurations, or even modify the firmware.The 2nd problem, tracked as CVE-2024-20421, makes it possible for distant, unauthenticated attackers to conduct CSRF assaults and conduct approximate activities on at risk units. An opponent can easily manipulate the safety defect by convincing a consumer to select a crafted link.Cisco also patched a medium-severity vulnerability (CVE-2024-20459) that could possibly make it possible for remote control, validated opponents to carry out approximate commands along with root privileges.The staying 5 protection flaws, all channel severeness, could be manipulated to perform cross-site scripting (XSS) strikes, implement random demands as root, perspective codes, change device arrangements or even reboot the gadget, and function commands along with supervisor privileges.According to Cisco, ATA 191 (on-premises or multiplatform) and also ATA 192 (multiplatform) gadgets are actually influenced. While there are no workarounds accessible, disabling the web-based management user interface in the Cisco ATA 191 on-premises firmware alleviates 6 of the defects.Patches for these bugs were featured in firmware variation 12.0.2 for the ATA 191 analog telephone adapters, as well as firmware model 11.2.5 for the ATA 191 and also 192 multiplatform analog telephone adapters.On Wednesday, Cisco additionally introduced spots for pair of medium-severity protection defects in the UCS Central Software application business monitoring service and also the Unified Call Facility Administration Website (Unified CCMP) that could lead to vulnerable relevant information disclosure as well as XSS attacks, respectively.Advertisement. Scroll to proceed reading.Cisco makes no mention of some of these weakness being actually manipulated in the wild. Added relevant information may be found on the company's surveillance advisories page.Connected: Splunk Business Update Patches Remote Code Implementation Vulnerabilities.Related: ICS Patch Tuesday: Advisories Released by Siemens, Schneider, Phoenix Metro Call, CERT@VDE.Related: Cisco to Acquire System Cleverness Organization ThousandEyes.Related: Cisco Patches Crucial Susceptibilities in Top Commercial Infrastructure (PRIVATE DETECTIVE) Software Application.

Articles You Can Be Interested In