Security

Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters

.Cisco on Wednesday announced patches for 8 susceptibilities in the firmware of ATA 190 set analog telephone adapters, consisting of pair of high-severity defects leading to setup adjustments and cross-site ask for forgery (CSRF) assaults.Impacting the web-based administration interface of the firmware and also tracked as CVE-2024-20458, the initial bug exists given that particular HTTP endpoints do not have authentication, permitting remote control, unauthenticated assailants to browse to a details link and also view or delete setups, or tweak the firmware.The 2nd concern, tracked as CVE-2024-20421, enables remote, unauthenticated opponents to administer CSRF assaults as well as carry out arbitrary activities on susceptible devices. An assailant can capitalize on the safety and security issue through convincing an individual to select a crafted web link.Cisco also patched a medium-severity vulnerability (CVE-2024-20459) that might permit remote control, authenticated enemies to carry out approximate commands with root advantages.The remaining 5 safety and security issues, all tool severity, could be exploited to perform cross-site scripting (XSS) attacks, perform approximate commands as origin, view security passwords, modify device arrangements or even reboot the unit, and also work commands along with manager advantages.According to Cisco, ATA 191 (on-premises or even multiplatform) as well as ATA 192 (multiplatform) tools are actually influenced. While there are actually no workarounds on call, disabling the web-based control user interface in the Cisco ATA 191 on-premises firmware alleviates six of the imperfections.Patches for these bugs were consisted of in firmware model 12.0.2 for the ATA 191 analog telephone adapters, and also firmware variation 11.2.5 for the ATA 191 and also 192 multiplatform analog telephone adapters.On Wednesday, Cisco likewise announced patches for pair of medium-severity safety and security issues in the UCS Central Program organization control answer and the Unified Call Facility Monitoring Gateway (Unified CCMP) that can cause delicate info disclosure and also XSS strikes, respectively.Advertisement. Scroll to continue analysis.Cisco makes no acknowledgment of any of these weakness being manipulated in bush. Extra relevant information may be discovered on the firm's safety and security advisories web page.Related: Splunk Venture Update Patches Remote Code Implementation Vulnerabilities.Associated: ICS Spot Tuesday: Advisories Posted through Siemens, Schneider, Phoenix Metro Get In Touch With, CERT@VDE.Associated: Cisco to Get Network Intellect Firm ThousandEyes.Related: Cisco Patches Essential Susceptibilities in Top Structure (PRIVATE EYE) Software Application.