ID

VAR-201910-0962


CVE

CVE-2019-15243


TITLE

Cisco SPA100 Series Analog Telephone Adapters Buffer error vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2019-010968 // CNNVD: CNNVD-201910-1120

DESCRIPTION

Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default. Cisco SPA100 Series Analog Telephone Adapters (ATAs) is a SPA100 series analog telephone adapter

Trust: 2.16

sources: NVD: CVE-2019-15243 // JVNDB: JVNDB-2019-010968 // CNVD: CNVD-2019-39613

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-39613

AFFECTED PRODUCTS

vendor:ciscomodel:spa112scope:eqversion:1.4.1

Trust: 1.6

vendor:ciscomodel:spa122scope:eqversion:1.4.1

Trust: 1.6

vendor:ciscomodel:spa112scope:ltversion:1.4.1

Trust: 1.0

vendor:ciscomodel:spa122scope:ltversion:1.4.1

Trust: 1.0

vendor:ciscomodel:spa 112scope: - version: -

Trust: 0.8

vendor:ciscomodel:spa 122scope: - version: -

Trust: 0.8

vendor:ciscomodel:spa112 2-port phone adapter and spa122 ata with router devices sr4scope:lteversion:<=1.4.1

Trust: 0.6

vendor:ciscomodel:spa122 ata with router devices sr4scope:lteversion:<=1.4.1

Trust: 0.6

vendor:ciscomodel:spa112scope:eqversion: -

Trust: 0.6

vendor:ciscomodel:spa122scope:eqversion: -

Trust: 0.6

sources: CNVD: CNVD-2019-39613 // JVNDB: JVNDB-2019-010968 // CNNVD: CNNVD-201910-1120 // NVD: CVE-2019-15243

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-15243
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-15243
value: HIGH

Trust: 1.0

NVD: CVE-2019-15243
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-39613
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201910-1120
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2019-15243
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-39613
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

ykramarz@cisco.com: CVE-2019-15243
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.1
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-15243
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.1
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2019-39613 // JVNDB: JVNDB-2019-010968 // CNNVD: CNNVD-201910-1120 // NVD: CVE-2019-15243 // NVD: CVE-2019-15243

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2019-010968 // NVD: CVE-2019-15243

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201910-1120

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201910-1120

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-010968

PATCH

title:cisco-sa-20191016-spa-rceurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-rce

Trust: 0.8

title:Patch for Cisco SPA100 Series Analog Telephone Adapters Remote Code Execution Vulnerability (CNVD-2019-39613)url:https://www.cnvd.org.cn/patchInfo/show/189153

Trust: 0.6

sources: CNVD: CNVD-2019-39613 // JVNDB: JVNDB-2019-010968

EXTERNAL IDS

db:NVDid:CVE-2019-15243

Trust: 3.0

db:JVNDBid:JVNDB-2019-010968

Trust: 0.8

db:CNVDid:CNVD-2019-39613

Trust: 0.6

db:AUSCERTid:ESB-2019.3878

Trust: 0.6

db:CNNVDid:CNNVD-201910-1120

Trust: 0.6

sources: CNVD: CNVD-2019-39613 // JVNDB: JVNDB-2019-010968 // CNNVD: CNNVD-201910-1120 // NVD: CVE-2019-15243

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-15243

Trust: 2.0

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191016-spa-rce

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15243

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191016-spa-ui-disclosure

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191016-spa-webui-dos

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191016-spa-running-config

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191016-spa-reflected-xss

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191016-spa-credentials

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3878/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-spa100-series-ata-code-execution-30652

Trust: 0.6

sources: CNVD: CNVD-2019-39613 // JVNDB: JVNDB-2019-010968 // CNNVD: CNNVD-201910-1120 // NVD: CVE-2019-15243

CREDITS

Andrew Orr and Alex Weber of Tenable Inc. .

Trust: 0.6

sources: CNNVD: CNNVD-201910-1120

SOURCES

db:CNVDid:CNVD-2019-39613
db:JVNDBid:JVNDB-2019-010968
db:CNNVDid:CNNVD-201910-1120
db:NVDid:CVE-2019-15243

LAST UPDATE DATE

2024-11-23T21:51:52.510000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-39613date:2019-11-08T00:00:00
db:JVNDBid:JVNDB-2019-010968date:2019-10-25T00:00:00
db:CNNVDid:CNNVD-201910-1120date:2019-12-03T00:00:00
db:NVDid:CVE-2019-15243date:2024-11-21T04:28:16.730

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-39613date:2019-11-08T00:00:00
db:JVNDBid:JVNDB-2019-010968date:2019-10-25T00:00:00
db:CNNVDid:CNNVD-201910-1120date:2019-10-16T00:00:00
db:NVDid:CVE-2019-15243date:2019-10-16T19:15:12.427