CVE-2024-20459

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated remote attackers with administrative privileges to execute arbitrary commands as root on Cisco ATA 190 Multiplatform Series Analog Telephone Adapter devices. The issue stems from insufficient input sanitization in the web management interface. Organizations using affected firmware versions are at risk.

💻 Affected Systems

Products:
  • Cisco ATA 190 Multiplatform Series Analog Telephone Adapter
Versions: Firmware versions prior to 12.2(1)SR1
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have administrative credentials to the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent backdoors, intercept communications, pivot to internal networks, or render devices inoperable.

🟠

Likely Case

Attackers with administrative credentials gain full control over affected devices to modify configurations, disrupt services, or use as foothold for further attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls, have restricted administrative access, and proper network segmentation is implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative credentials but is straightforward once authenticated due to the command injection vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version 12.2(1)SR1 and later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy

Restart Required: Yes

Instructions:

1. Download firmware version 12.2(1)SR1 or later from Cisco Software Center. 2. Log into device web interface. 3. Navigate to Administration > Software Upgrade. 4. Upload and install new firmware. 5. Reboot device after installation completes.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative interface access to trusted IP addresses only

Configure firewall rules to restrict access to management interface IP/port from authorized networks only

Network Segmentation

all

Isolate ATA devices on separate VLANs with restricted communication

Configure network switches to place ATA devices on isolated VLAN with limited routing

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the management interface
  • Change administrative credentials and implement strong password policies

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: Login > Status > System Information > Firmware Version

Check Version:

Check web interface or use SNMP query to device system description

Verify Fix Applied:

Verify firmware version is 12.2(1)SR1 or later after upgrade

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed login attempts followed by successful administrative login
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from ATA devices
  • Traffic to unexpected ports from ATA management interface

SIEM Query:

source="cisco-ata" AND (event_type="command_execution" OR user="admin" AND action="configuration_change")

🔗 References

📤 Share & Export