Security

Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters

.Cisco on Wednesday announced spots for 8 susceptibilities in the firmware of ATA 190 set analog telephone adapters, including pair of high-severity defects leading to configuration improvements and cross-site demand forgery (CSRF) attacks.Impacting the online administration user interface of the firmware and tracked as CVE-2024-20458, the first bug exists because details HTTP endpoints lack authentication, enabling remote, unauthenticated assailants to browse to a certain URL and also scenery or remove configurations, or even modify the firmware.The 2nd issue, tracked as CVE-2024-20421, enables remote, unauthenticated aggressors to perform CSRF attacks and perform arbitrary actions on prone tools. An aggressor can easily capitalize on the safety and security issue through persuading a customer to click a crafted hyperlink.Cisco also covered a medium-severity susceptability (CVE-2024-20459) that can make it possible for remote, certified attackers to implement arbitrary commands with root benefits.The continuing to be five surveillance flaws, all tool severity, may be manipulated to conduct cross-site scripting (XSS) assaults, carry out arbitrary orders as origin, viewpoint passwords, tweak gadget arrangements or reboot the device, and also function demands with administrator advantages.Depending on to Cisco, ATA 191 (on-premises or multiplatform) and ATA 192 (multiplatform) devices are actually had an effect on. While there are no workarounds readily available, disabling the web-based monitoring user interface in the Cisco ATA 191 on-premises firmware mitigates 6 of the defects.Patches for these bugs were actually consisted of in firmware model 12.0.2 for the ATA 191 analog telephone adapters, as well as firmware version 11.2.5 for the ATA 191 and also 192 multiplatform analog telephone adapters.On Wednesday, Cisco also revealed patches for 2 medium-severity safety and security flaws in the UCS Central Software venture administration answer and the Unified Contact Facility Control Portal (Unified CCMP) that can lead to vulnerable relevant information disclosure and XSS assaults, respectively.Advertisement. Scroll to proceed analysis.Cisco makes no reference of any of these susceptabilities being exploited in bush. Extra details could be discovered on the business's protection advisories web page.Related: Splunk Organization Update Patches Remote Code Completion Vulnerabilities.Connected: ICS Spot Tuesday: Advisories Published by Siemens, Schneider, Phoenix Az Connect With, CERT@VDE.Associated: Cisco to Acquire System Intelligence Organization ThousandEyes.Associated: Cisco Patches Important Weakness in Top Structure (PI) Program.