The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a firmware release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.
Details about the vulnerabilities are as follows:
CVE-2024-20458: Cisco ATA 190 Series Analog Telephone Adapter Firmware Authentication Vulnerability
A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to view or delete the configuration or change the firmware on an affected device.
This vulnerability is due to a lack of authentication on specific HTTP endpoints. An attacker could exploit this vulnerability by browsing to a specific URL. A successful exploit could allow the attacker to view or delete the configuration or change the firmware.
Cisco has released firmware updates that address this vulnerability. There are no workarounds that address this vulnerability. However, there is a mitigation. For instructions, see the Workarounds section of this advisory.
Bug ID(s): CSCwf28097, CSCwf28102
CVE ID: CVE-2024-20458
Security Impact Rating (SIR): High
CVSS Base Score: Base 8.2
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
CVE-2024-20421: Cisco ATA 190 Series Analog Telephone Adapter Firmware Cross-Site Request Forgery Vulnerability
A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user.
Cisco has released firmware updates that address this vulnerability. There are no workarounds that address this vulnerability. However, there is a mitigation. For instructions, see the Workarounds section of this advisory.
Bug ID(s): CSCwf28426, CSCwf28421
CVE ID: CVE-2024-20421
Security Impact Rating (SIR): High
CVSS Base Score: 7.1
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
CVE-2024-20459: Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Command Injection Vulnerability
A vulnerability in the web-based management interface of Cisco ATA 190 Multiplatform Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with high privileges to execute arbitrary commands as the root user on the underlying operating system.
This vulnerability is due to a lack of input sanitization in the web-based management interface. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user.
Cisco has released firmware updates that address this vulnerability. There are no workarounds that address this vulnerability. However, there is a mitigation. For instructions, see the Workarounds section of this advisory.
Bug ID(s): CSCwf28499, CSCwf28048
CVE ID: CVE-2024-20459
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
CVE-2024-20460: Cisco ATA 190 Series Analog Telephone Adapter Firmware Reflected Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information on an affected device.
Cisco has released firmware updates that address this vulnerability. There are no workarounds that address this vulnerability. However, there is a mitigation. For instructions, see the Workarounds section of this advisory.
Bug ID(s): CSCwf28041, CSCwf28037
CVE ID: CVE-2024-20460
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.1
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVE-2024-20461: Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection Vulnerability
A vulnerability in the CLI of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, local attacker with high privileges to execute arbitrary commands as the root user.
This vulnerability exists because CLI input is not properly sanitized. An attacker could exploit this vulnerability by sending malicious characters to the CLI. A successful exploit could allow the attacker to read and write to the underlying operating system as the root user.
Cisco has released firmware updates that address this vulnerability. There are no workarounds that address this vulnerability.
Bug ID(s): CSCwf28378, CSCwf30963
CVE ID: CVE-2024-20461
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.0
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
CVE-2024-20462: Cisco ATA 190 Series Analog Telephone Adapter Multiplatform Firmware Information Disclosure Vulnerability
A vulnerability in the web-based management interface of Cisco ATA 190 Series Multiplatform Analog Telephone Adapter firmware could allow an authenticated, local attacker with low privileges to view passwords on an affected device.
This vulnerability is due to incorrect sanitization of HTML content from an affected device. A successful exploit could allow the attacker to view passwords that belong to other users.
Cisco has released firmware updates that address this vulnerability. There are no workarounds that address this vulnerability.
Bug ID(s): CSCwf28398
CVE ID: CVE-2024-20462
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.5
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2024-20463: Cisco ATA 190 Series Analog Telephone Adapter Firmware Command Injection and Denial of Service Vulnerability
A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to modify the configuration or reboot an affected device.
This vulnerability is due to the HTTP server allowing state changes in GET requests. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface on an affected device. A successful exploit could allow the attacker to make limited modifications to the configuration or reboot the device, resulting in a denial of service (DoS) condition.
Cisco has released firmware updates that address this vulnerability. There are no workarounds that address this vulnerability. However, there is a mitigation. For instructions, see the Workarounds section of this advisory.
Bug ID(s): CSCwf28345, CSCwf28348
CVE ID: CVE-2024-20463
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.4
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
CVE-2024-20420: Cisco ATA 190 Series Analog Telephone Adapter Firmware Privilege Escalation Vulnerability
A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with low privileges to run commands as an Admin user.
This vulnerability is due to incorrect authorization verification by the HTTP server. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to run commands as the Admin user.
Cisco has released firmware updates that address this vulnerability. There are no workarounds that address this vulnerability. However, there is a mitigation. For instructions, see the Workarounds section of this advisory.
Bug ID(s): CSCwf28191, CSCwf28188
CVE ID: CVE-2024-20420
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.4
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N