Security

Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters

.Cisco on Wednesday introduced patches for 8 weakness in the firmware of ATA 190 set analog telephone adapters, consisting of 2 high-severity problems leading to configuration changes and cross-site ask for imitation (CSRF) assaults.Affecting the online control user interface of the firmware as well as tracked as CVE-2024-20458, the initial bug exists since specific HTTP endpoints do not have verification, permitting distant, unauthenticated enemies to surf to a details URL as well as perspective or delete setups, or customize the firmware.The 2nd concern, tracked as CVE-2024-20421, enables remote, unauthenticated aggressors to carry out CSRF assaults as well as carry out approximate actions on at risk devices. An enemy can manipulate the safety defect through encouraging a user to select a crafted hyperlink.Cisco likewise covered a medium-severity susceptibility (CVE-2024-20459) that can enable distant, authenticated attackers to implement random commands along with origin advantages.The remaining 5 safety and security issues, all channel severity, can be made use of to conduct cross-site scripting (XSS) assaults, execute arbitrary orders as origin, viewpoint passwords, change unit arrangements or even reboot the tool, and operate orders along with supervisor advantages.According to Cisco, ATA 191 (on-premises or multiplatform) and also ATA 192 (multiplatform) units are actually affected. While there are no workarounds offered, disabling the web-based monitoring interface in the Cisco ATA 191 on-premises firmware alleviates 6 of the imperfections.Patches for these bugs were included in firmware version 12.0.2 for the ATA 191 analog telephone adapters, and firmware variation 11.2.5 for the ATA 191 as well as 192 multiplatform analog telephone adapters.On Wednesday, Cisco additionally revealed patches for pair of medium-severity surveillance issues in the UCS Central Software company control option as well as the Unified Call Center Administration Gateway (Unified CCMP) that could result in sensitive info disclosure and XSS assaults, respectively.Advertisement. Scroll to proceed analysis.Cisco creates no acknowledgment of any one of these susceptabilities being actually capitalized on in the wild. Extra relevant information can be located on the firm's safety and security advisories webpage.Associated: Splunk Business Update Patches Remote Code Execution Vulnerabilities.Related: ICS Patch Tuesday: Advisories Released through Siemens, Schneider, Phoenix Contact, CERT@VDE.Related: Cisco to Acquire System Cleverness Organization ThousandEyes.Related: Cisco Patches Critical Vulnerabilities in Excellent Framework (PI) Program.