A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to unsafe handling of user credentials. An attacker could exploit this vulnerability by viewing portions of the web-based management interface of an affected device. A successful exploit could allow the attacker to access administrative credentials and potentially gain elevated privileges by reusing stolen credentials on the affected device.
                
            References
                    | Link | Resource | 
|---|---|
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-credentials | Vendor Advisory | 
| https://www.tenable.com/security/research/tra-2019-44 | Third Party Advisory | 
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-credentials | Vendor Advisory | 
| https://www.tenable.com/security/research/tra-2019-44 | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
History
                    No history.
Information
                Published : 2019-10-16 19:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12708
Mitre link : CVE-2019-12708
CVE.ORG link : CVE-2019-12708
JSON object : View
Products Affected
                cisco
- spa112
- spa122_firmware
- spa122
- spa112_firmware
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
