PT-2023-2522 · Cisco · Cisco Ata 190 +1
Catalpa
·
Published
2023-05-03
·
Updated
2023-08-26
·
CVE-2023-20126
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Cisco SPA112 versions (affected versions not specified)
Description:
A vulnerability in the web-based management interface of Cisco SPA112 2-Port Phone Adapters could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to a missing authentication process within the firmware upgrade function. An attacker could exploit this vulnerability by upgrading an affected device to a crafted version of firmware. A successful exploit could allow the attacker to execute arbitrary code on the affected device with full privileges.
Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability. Cisco has stated that they will not release firmware updates to address this vulnerability since the 2-Port Phone Adapters are already end-of-life. As a workaround, Cisco recommends transitioning to the Cisco ATA 190 series analog telephone adapter.
Exploit
Missing Authentication
Weakness Enumeration
Related Identifiers
Affected Products
References · 16
- 🔥 https://github.com/fullspectrumdev/RancidCrisco⭐ 20 🔗 1 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2023-20126 · Security Note
- https://bdu.fstec.ru/vul/2023-02321 · Security Note
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-unauth-upgrade-UqhyTWW · Vendor Advisory
- https://t.me/defcon_news/116149 · Telegram Post
- https://t.me/thehackernews/3318 · Telegram Post
- https://cybersecurity-help.cz/vdb/SB2023050352 · Note
- https://t.me/true_secator/4648 · Telegram Post
- https://t.me/cybersecuritytechnologies/8728 · Telegram Post
- https://vuldb.com/?id.227940 · Note
- https://t.me/rnetsec/19002 · Telegram Post
- https://twitter.com/techadversary/status/1695615248798269943 · Twitter Post
- https://t.me/pentestingnews/35661 · Telegram Post
- https://t.me/cvenotify/50174 · Telegram Post
- https://t.me/true_secator/4354 · Telegram Post