Security

Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters

.Cisco on Wednesday declared patches for 8 weakness in the firmware of ATA 190 collection analog telephone adapters, consisting of pair of high-severity problems bring about configuration changes as well as cross-site demand imitation (CSRF) assaults.Affecting the online management interface of the firmware and also tracked as CVE-2024-20458, the initial bug exists considering that certain HTTP endpoints lack authorization, making it possible for distant, unauthenticated assailants to browse to a certain link and sight or even delete configurations, or even tweak the firmware.The 2nd problem, tracked as CVE-2024-20421, allows remote, unauthenticated assailants to carry out CSRF assaults as well as carry out approximate activities on at risk devices. An attacker can easily make use of the safety issue by persuading a customer to click on a crafted web link.Cisco also patched a medium-severity weakness (CVE-2024-20459) that could permit remote control, validated aggressors to execute approximate demands along with root opportunities.The remaining five protection problems, all medium intensity, may be exploited to administer cross-site scripting (XSS) assaults, perform approximate orders as root, viewpoint security passwords, tweak device setups or even reboot the gadget, and also operate commands along with administrator benefits.Depending on to Cisco, ATA 191 (on-premises or even multiplatform) and ATA 192 (multiplatform) devices are actually affected. While there are actually no workarounds available, turning off the web-based control interface in the Cisco ATA 191 on-premises firmware alleviates 6 of the imperfections.Patches for these bugs were actually included in firmware variation 12.0.2 for the ATA 191 analog telephone adapters, and also firmware version 11.2.5 for the ATA 191 and 192 multiplatform analog telephone adapters.On Wednesday, Cisco also revealed patches for 2 medium-severity safety and security defects in the UCS Central Program organization administration option and the Unified Call Facility Monitoring Website (Unified CCMP) that can trigger sensitive information declaration and also XSS strikes, respectively.Advertisement. Scroll to carry on analysis.Cisco creates no reference of any of these susceptabilities being actually capitalized on in the wild. Extra relevant information may be discovered on the company's safety advisories web page.Associated: Splunk Company Update Patches Remote Code Implementation Vulnerabilities.Connected: ICS Spot Tuesday: Advisories Released by Siemens, Schneider, Phoenix Call, CERT@VDE.Associated: Cisco to Purchase System Intellect Firm ThousandEyes.Associated: Cisco Patches Critical Vulnerabilities in Prime Infrastructure (PI) Software Application.