Security

Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters

.Cisco on Wednesday revealed spots for 8 susceptibilities in the firmware of ATA 190 collection analog telephone adapters, consisting of two high-severity imperfections resulting in setup modifications and also cross-site request imitation (CSRF) strikes.Influencing the online administration interface of the firmware as well as tracked as CVE-2024-20458, the initial bug exists considering that specific HTTP endpoints do not have authentication, making it possible for remote, unauthenticated enemies to scan to a details URL as well as perspective or even delete arrangements, or modify the firmware.The second problem, tracked as CVE-2024-20421, allows remote, unauthenticated enemies to conduct CSRF strikes and also conduct random activities on susceptible units. An attacker can easily capitalize on the safety and security flaw by enticing an individual to click a crafted link.Cisco also covered a medium-severity vulnerability (CVE-2024-20459) that could possibly permit remote, verified assailants to implement arbitrary commands along with origin advantages.The remaining 5 surveillance problems, all channel extent, may be capitalized on to conduct cross-site scripting (XSS) strikes, execute random orders as origin, sight security passwords, customize gadget arrangements or even reboot the tool, and operate demands with manager benefits.According to Cisco, ATA 191 (on-premises or even multiplatform) and also ATA 192 (multiplatform) gadgets are influenced. While there are actually no workarounds available, turning off the web-based administration interface in the Cisco ATA 191 on-premises firmware alleviates six of the flaws.Patches for these bugs were included in firmware variation 12.0.2 for the ATA 191 analog telephone adapters, and also firmware version 11.2.5 for the ATA 191 and 192 multiplatform analog telephone adapters.On Wednesday, Cisco likewise announced spots for 2 medium-severity protection problems in the UCS Central Program company management remedy and the Unified Connect With Center Administration Gateway (Unified CCMP) that could result in vulnerable details acknowledgment and also XSS assaults, respectively.Advertisement. Scroll to continue analysis.Cisco creates no mention of some of these susceptabilities being exploited in the wild. Additional information may be discovered on the company's surveillance advisories web page.Related: Splunk Enterprise Update Patches Remote Code Implementation Vulnerabilities.Connected: ICS Patch Tuesday: Advisories Published by Siemens, Schneider, Phoenix Contact, CERT@VDE.Associated: Cisco to Acquire Network Knowledge Organization ThousandEyes.Connected: Cisco Patches Vital Vulnerabilities in Best Structure (PRIVATE DETECTIVE) Software Program.