Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-15249

Опубликовано: 16 окт. 2019
Источник: nvd
CVSS3: 8
CVSS3: 8
CVSS2: 5.2
EPSS Низкий

Описание

Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:cisco:spa112_firmware:*:*:*:*:*:*:*:*
Версия до 1.4.1 (исключая)
cpe:2.3:o:cisco:spa112_firmware:1.4.1:-:*:*:*:*:*:*
cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr1:*:*:*:*:*:*
cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr2:*:*:*:*:*:*
cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr3:*:*:*:*:*:*
cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr4:*:*:*:*:*:*
cpe:2.3:h:cisco:spa112:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

Одно из

cpe:2.3:o:cisco:spa122_firmware:*:*:*:*:*:*:*:*
Версия до 1.4.1 (исключая)
cpe:2.3:o:cisco:spa122_firmware:1.4.1:-:*:*:*:*:*:*
cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr1:*:*:*:*:*:*
cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr2:*:*:*:*:*:*
cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr3:*:*:*:*:*:*
cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr4:*:*:*:*:*:*
cpe:2.3:h:cisco:spa122:-:*:*:*:*:*:*:*

EPSS

Процентиль: 49%
0.00255
Низкий

8 High

CVSS3

8 High

CVSS3

5.2 Medium

CVSS2

Дефекты

CWE-119
CWE-119

Связанные уязвимости

CVSS3: 8
github
больше 3 лет назад

Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.

CVSS3: 8
fstec
больше 6 лет назад

Уязвимость веб-интерфейса управления микропрограммного обеспечения IP-телефонов Cisco SPA100 Series, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями

EPSS

Процентиль: 49%
0.00255
Низкий

8 High

CVSS3

8 High

CVSS3

5.2 Medium

CVSS2

Дефекты

CWE-119
CWE-119