Guest

Preview Tool

Cisco Bug: CSCvq50523 - Cisco SPA100 Series Running Configuration Information Disclosure Vulnerability

Last Modified

Oct 16, 2019

Products (1)

  • Cisco Small Business Voice Gateways and ATAs

Known Affected Releases

1.4.1SR3

Description (partial)

Symptom:
A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to access sensitive information on an affected device.

The vulnerability is due to improper restrictions on configuration information. An attacker could exploit this vulnerability by sending a request to an affected device through the web-based management interface. A successful exploit could allow the attacker to return running configuration information that could also include sensitive information.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-running-config

Conditions:
At the time of publication, this vulnerability affected Cisco SPA 100 Series devices with firmware versions 1.4.1 SR3 and prior.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.