// For flags

CVE-2019-15242

Cisco SPA100 Series Analog Telephone Adapters Remote Code Execution Vulnerabilities

Severity Score

8.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.

Múltiples vulnerabilidades en los dispositivos Cisco SPA100 Series Analog Telephone Adapters (ATAs), podrían permitir a un atacante adyacente autenticado ejecutar código arbitrario con privilegios elevados. Las vulnerabilidades son debido a una comprobación inapropiada de la entrada suministrada por el usuario en la interfaz de administración basada en web. Un atacante podría explotar estas vulnerabilidades al autenticarse en la interfaz de administración basada en web y enviando peticiones diseñadas hacia un dispositivo afectado. Una explotación con éxito podría permitir al atacante ejecutar código arbitrario con privilegios elevados. Nota: La interfaz de administración basada en web está habilitada por defecto.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-08-20 CVE Reserved
  • 2019-10-16 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Spa112 Firmware
Search vendor "Cisco" for product "Spa112 Firmware"
< 1.4.1
Search vendor "Cisco" for product "Spa112 Firmware" and version " < 1.4.1"
-
Affected
in Cisco
Search vendor "Cisco"
Spa112
Search vendor "Cisco" for product "Spa112"
--
Safe
Cisco
Search vendor "Cisco"
Spa112 Firmware
Search vendor "Cisco" for product "Spa112 Firmware"
1.4.1
Search vendor "Cisco" for product "Spa112 Firmware" and version "1.4.1"
-
Affected
in Cisco
Search vendor "Cisco"
Spa112
Search vendor "Cisco" for product "Spa112"
--
Safe
Cisco
Search vendor "Cisco"
Spa112 Firmware
Search vendor "Cisco" for product "Spa112 Firmware"
1.4.1
Search vendor "Cisco" for product "Spa112 Firmware" and version "1.4.1"
sr1
Affected
in Cisco
Search vendor "Cisco"
Spa112
Search vendor "Cisco" for product "Spa112"
--
Safe
Cisco
Search vendor "Cisco"
Spa112 Firmware
Search vendor "Cisco" for product "Spa112 Firmware"
1.4.1
Search vendor "Cisco" for product "Spa112 Firmware" and version "1.4.1"
sr2
Affected
in Cisco
Search vendor "Cisco"
Spa112
Search vendor "Cisco" for product "Spa112"
--
Safe
Cisco
Search vendor "Cisco"
Spa112 Firmware
Search vendor "Cisco" for product "Spa112 Firmware"
1.4.1
Search vendor "Cisco" for product "Spa112 Firmware" and version "1.4.1"
sr3
Affected
in Cisco
Search vendor "Cisco"
Spa112
Search vendor "Cisco" for product "Spa112"
--
Safe
Cisco
Search vendor "Cisco"
Spa112 Firmware
Search vendor "Cisco" for product "Spa112 Firmware"
1.4.1
Search vendor "Cisco" for product "Spa112 Firmware" and version "1.4.1"
sr4
Affected
in Cisco
Search vendor "Cisco"
Spa112
Search vendor "Cisco" for product "Spa112"
--
Safe
Cisco
Search vendor "Cisco"
Spa122 Firmware
Search vendor "Cisco" for product "Spa122 Firmware"
< 1.4.1
Search vendor "Cisco" for product "Spa122 Firmware" and version " < 1.4.1"
-
Affected
in Cisco
Search vendor "Cisco"
Spa122
Search vendor "Cisco" for product "Spa122"
--
Safe
Cisco
Search vendor "Cisco"
Spa122 Firmware
Search vendor "Cisco" for product "Spa122 Firmware"
1.4.1
Search vendor "Cisco" for product "Spa122 Firmware" and version "1.4.1"
-
Affected
in Cisco
Search vendor "Cisco"
Spa122
Search vendor "Cisco" for product "Spa122"
--
Safe
Cisco
Search vendor "Cisco"
Spa122 Firmware
Search vendor "Cisco" for product "Spa122 Firmware"
1.4.1
Search vendor "Cisco" for product "Spa122 Firmware" and version "1.4.1"
sr1
Affected
in Cisco
Search vendor "Cisco"
Spa122
Search vendor "Cisco" for product "Spa122"
--
Safe
Cisco
Search vendor "Cisco"
Spa122 Firmware
Search vendor "Cisco" for product "Spa122 Firmware"
1.4.1
Search vendor "Cisco" for product "Spa122 Firmware" and version "1.4.1"
sr2
Affected
in Cisco
Search vendor "Cisco"
Spa122
Search vendor "Cisco" for product "Spa122"
--
Safe
Cisco
Search vendor "Cisco"
Spa122 Firmware
Search vendor "Cisco" for product "Spa122 Firmware"
1.4.1
Search vendor "Cisco" for product "Spa122 Firmware" and version "1.4.1"
sr3
Affected
in Cisco
Search vendor "Cisco"
Spa122
Search vendor "Cisco" for product "Spa122"
--
Safe
Cisco
Search vendor "Cisco"
Spa122 Firmware
Search vendor "Cisco" for product "Spa122 Firmware"
1.4.1
Search vendor "Cisco" for product "Spa122 Firmware" and version "1.4.1"
sr4
Affected
in Cisco
Search vendor "Cisco"
Spa122
Search vendor "Cisco" for product "Spa122"
--
Safe