CVE-2019-15243
Cisco SPA100 Series Analog Telephone Adapters Remote Code Execution Vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
Múltiples vulnerabilidades en los dispositivos Cisco SPA100 Series Analog Telephone Adapters (ATAs), podrían permitir a un atacante adyacente autenticado ejecutar código arbitrario con privilegios elevados. Las vulnerabilidades son debido a una comprobación inapropiada de la entrada suministrada por el usuario en la interfaz de administración basada en web. Un atacante podría explotar estas vulnerabilidades al autenticarse en la interfaz de administración basada en web y enviando peticiones diseñadas hacia un dispositivo afectado. Una explotación con éxito podría permitir al atacante ejecutar código arbitrario con privilegios elevados. Nota: La interfaz de administración basada en web está habilitada por defecto.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2019-08-20 CVE Reserved
- 2019-10-16 CVE Published
- 2023-03-08 EPSS Updated
- 2024-11-20 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce | 2019-10-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Spa112 Firmware Search vendor "Cisco" for product "Spa112 Firmware" | < 1.4.1 Search vendor "Cisco" for product "Spa112 Firmware" and version " < 1.4.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Spa112 Search vendor "Cisco" for product "Spa112" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Spa112 Firmware Search vendor "Cisco" for product "Spa112 Firmware" | 1.4.1 Search vendor "Cisco" for product "Spa112 Firmware" and version "1.4.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Spa112 Search vendor "Cisco" for product "Spa112" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Spa112 Firmware Search vendor "Cisco" for product "Spa112 Firmware" | 1.4.1 Search vendor "Cisco" for product "Spa112 Firmware" and version "1.4.1" | sr1 |
Affected
| in | Cisco Search vendor "Cisco" | Spa112 Search vendor "Cisco" for product "Spa112" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Spa112 Firmware Search vendor "Cisco" for product "Spa112 Firmware" | 1.4.1 Search vendor "Cisco" for product "Spa112 Firmware" and version "1.4.1" | sr2 |
Affected
| in | Cisco Search vendor "Cisco" | Spa112 Search vendor "Cisco" for product "Spa112" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Spa112 Firmware Search vendor "Cisco" for product "Spa112 Firmware" | 1.4.1 Search vendor "Cisco" for product "Spa112 Firmware" and version "1.4.1" | sr3 |
Affected
| in | Cisco Search vendor "Cisco" | Spa112 Search vendor "Cisco" for product "Spa112" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Spa112 Firmware Search vendor "Cisco" for product "Spa112 Firmware" | 1.4.1 Search vendor "Cisco" for product "Spa112 Firmware" and version "1.4.1" | sr4 |
Affected
| in | Cisco Search vendor "Cisco" | Spa112 Search vendor "Cisco" for product "Spa112" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Spa122 Firmware Search vendor "Cisco" for product "Spa122 Firmware" | < 1.4.1 Search vendor "Cisco" for product "Spa122 Firmware" and version " < 1.4.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Spa122 Search vendor "Cisco" for product "Spa122" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Spa122 Firmware Search vendor "Cisco" for product "Spa122 Firmware" | 1.4.1 Search vendor "Cisco" for product "Spa122 Firmware" and version "1.4.1" | - |
Affected
| in | Cisco Search vendor "Cisco" | Spa122 Search vendor "Cisco" for product "Spa122" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Spa122 Firmware Search vendor "Cisco" for product "Spa122 Firmware" | 1.4.1 Search vendor "Cisco" for product "Spa122 Firmware" and version "1.4.1" | sr1 |
Affected
| in | Cisco Search vendor "Cisco" | Spa122 Search vendor "Cisco" for product "Spa122" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Spa122 Firmware Search vendor "Cisco" for product "Spa122 Firmware" | 1.4.1 Search vendor "Cisco" for product "Spa122 Firmware" and version "1.4.1" | sr2 |
Affected
| in | Cisco Search vendor "Cisco" | Spa122 Search vendor "Cisco" for product "Spa122" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Spa122 Firmware Search vendor "Cisco" for product "Spa122 Firmware" | 1.4.1 Search vendor "Cisco" for product "Spa122 Firmware" and version "1.4.1" | sr3 |
Affected
| in | Cisco Search vendor "Cisco" | Spa122 Search vendor "Cisco" for product "Spa122" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Spa122 Firmware Search vendor "Cisco" for product "Spa122 Firmware" | 1.4.1 Search vendor "Cisco" for product "Spa122 Firmware" and version "1.4.1" | sr4 |
Affected
| in | Cisco Search vendor "Cisco" | Spa122 Search vendor "Cisco" for product "Spa122" | - | - |
Safe
|