A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to improper restrictions on configuration information. An attacker could exploit this vulnerability by sending a request to an affected device through the web-based management interface. A successful exploit could allow the attacker to return running configuration information that could also include sensitive information.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-running-config | Vendor Advisory |
https://www.tenable.com/security/research/tra-2019-44 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2019-10-16T00:00:00
Updated: 2019-10-17T19:06:08
Reserved: 2019-08-20T00:00:00
Link: CVE-2019-15257
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-10-16T19:15:13.537
Modified: 2020-10-09T12:39:33.910
Link: CVE-2019-15257
JSON object: View
Redhat Information
No data.
CWE