A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to unsafe handling of user credentials. An attacker could exploit this vulnerability by viewing portions of the web-based management interface of an affected device. A successful exploit could allow the attacker to access administrative credentials and potentially gain elevated privileges by reusing stolen credentials on the affected device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-credentials | Vendor Advisory |
https://www.tenable.com/security/research/tra-2019-44 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2019-10-16T00:00:00
Updated: 2019-10-17T19:06:08
Reserved: 2019-06-04T00:00:00
Link: CVE-2019-12708
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-10-16T19:15:11.847
Modified: 2019-10-21T17:01:59.493
Link: CVE-2019-12708
JSON object: View
Redhat Information
No data.
CWE