Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters

.Cisco on Wednesday revealed spots for 8 susceptabilities in the firmware of ATA 190 set analog telephone adapters, featuring two high-severity problems causing arrangement changes as well as cross-site ask for bogus (CSRF) attacks.Influencing the online monitoring user interface of the firmware as well as tracked as CVE-2024-20458, the initial bug exists considering that particular HTTP endpoints do not have verification, enabling remote control, unauthenticated assaulters to search to a specific link as well as viewpoint or even remove setups, or even customize the firmware.The 2nd issue, tracked as CVE-2024-20421, allows remote, unauthenticated opponents to conduct CSRF attacks and carry out arbitrary activities on at risk gadgets. An aggressor can manipulate the surveillance problem through convincing a consumer to click on a crafted hyperlink.Cisco likewise covered a medium-severity vulnerability (CVE-2024-20459) that can enable remote, authenticated assailants to perform random commands along with root privileges.The remaining five security defects, all channel severeness, might be manipulated to conduct cross-site scripting (XSS) assaults, execute arbitrary commands as root, sight security passwords, customize device configurations or reboot the gadget, and operate commands with supervisor advantages.Depending on to Cisco, ATA 191 (on-premises or even multiplatform) and also ATA 192 (multiplatform) devices are influenced. While there are no workarounds accessible, turning off the online monitoring user interface in the Cisco ATA 191 on-premises firmware relieves 6 of the problems.Patches for these bugs were consisted of in firmware version 12.0.2 for the ATA 191 analog telephone adapters, and firmware model 11.2.5 for the ATA 191 as well as 192 multiplatform analog telephone adapters.On Wednesday, Cisco likewise introduced spots for 2 medium-severity safety and security flaws in the UCS Central Software application company monitoring option as well as the Unified Connect With Facility Monitoring Website (Unified CCMP) that could trigger delicate information acknowledgment as well as XSS assaults, respectively.Advertisement.

Scroll to proceed reading.Cisco makes no mention of some of these weakness being manipulated in bush. Added details can be located on the company’s safety advisories web page.Connected: Splunk Company Update Patches Remote Code Implementation Vulnerabilities.Associated: ICS Spot Tuesday: Advisories Posted by Siemens, Schneider, Phoenix Metro Connect With, CERT@VDE.Related: Cisco to Acquire Network Intelligence Company ThousandEyes.Connected: Cisco Patches Critical Susceptibilities in Best Commercial Infrastructure (PI) Software.