CVE-2024-20420

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated remote attackers with low privileges to execute commands as Admin users on Cisco ATA 190 Series Analog Telephone Adapters. Attackers can exploit this by sending malicious HTTP requests to the web management interface. Organizations using affected firmware versions are at risk.

💻 Affected Systems

Products:
  • Cisco ATA 190 Series Analog Telephone Adapter
Versions: Firmware versions prior to 12.0(1)SR1
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have any authenticated access to the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative control of the device, allowing configuration changes, service disruption, or use as a pivot point into the network.

🟠

Likely Case

Unauthorized configuration changes, service disruption, or credential harvesting from the device.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent low-privileged users from reaching the management interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but low privileges are sufficient. The vulnerability is in authorization verification, making exploitation straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version 12.0(1)SR1 or later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy

Restart Required: Yes

Instructions:

1. Download firmware version 12.0(1)SR1 or later from Cisco's software download center. 2. Access the device's web management interface as an administrator. 3. Navigate to the firmware upgrade section. 4. Upload and install the new firmware. 5. Reboot the device after installation completes.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit access to the web management interface to trusted administrative networks only using firewall rules or network segmentation.

Use Strong Authentication

all

Ensure all user accounts have strong, unique passwords and consider implementing multi-factor authentication if supported.

🧯 If You Can't Patch

  • Isolate affected devices in a separate VLAN with strict firewall rules preventing unauthorized access to the management interface.
  • Monitor network traffic to the management interface for suspicious activity and implement intrusion detection rules.

🔍 How to Verify

Check if Vulnerable:

Check the firmware version via the web interface (System Information page) or CLI using 'show version' command.

Check Version:

show version

Verify Fix Applied:

After patching, verify the firmware version shows 12.0(1)SR1 or later and test that low-privileged users cannot execute administrative commands.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to administrative endpoints from low-privileged user accounts
  • Configuration changes made by non-admin users

Network Indicators:

  • HTTP POST requests to administrative API endpoints from unexpected source IPs
  • Unusual command execution patterns in management traffic

SIEM Query:

source="cisco-ata" AND (http_method="POST" AND (uri="/admin/*" OR uri="/config/*")) AND user_role!="admin"

🔗 References

📤 Share & Export