CVE-2023-20126
Summary
| CVE | CVE-2023-20126 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-05-04 20:15:00 UTC |
| Updated | 2023-11-07 04:06:00 UTC |
| Description | A vulnerability in the web-based management interface of Cisco SPA112 2-Port Phone Adapters could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to a missing authentication process within the firmware upgrade function. An attacker could exploit this vulnerability by upgrading an affected device to a crafted version of firmware. A successful exploit could allow the attacker to execute arbitrary code on the affected device with full privileges. Cisco has not released firmware updates to address this vulnerability. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Cisco SPA112 2-Port Phone Adapters Remote Command Execution Vulnerability |
CISCO |
sec.cloudapps.cisco.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 730795 Cisco SPA112 2-Port Phone Adapters Remote Command Execution Vulnerability (cisco-sa-spa-unauth-upgrade-UqhyTWW)