CVE-2024-20463

5.4 MEDIUM

📋 TL;DR

This vulnerability in Cisco ATA 190 Series Analog Telephone Adapters allows unauthenticated remote attackers to modify device configuration or reboot devices via malicious HTTP GET requests to the web management interface. This affects organizations using vulnerable firmware versions of these VoIP adapters, potentially causing service disruption.

💻 Affected Systems

Products:
  • Cisco ATA 190 Series Analog Telephone Adapter
Versions: Firmware versions prior to 12.0(1)SR1
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with web-based management interface enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker repeatedly reboots critical VoIP devices, causing extended denial of service for phone services across an organization.

🟠

Likely Case

Limited configuration changes or temporary device reboots disrupting individual phone lines until manual intervention.

🟢

If Mitigated

No impact if devices are patched or properly segmented from untrusted networks.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers on the internet to directly target exposed devices.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires network access to management interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request manipulation required, no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware 12.0(1)SR1 and later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy

Restart Required: Yes

Instructions:

1. Download firmware 12.0(1)SR1 or later from Cisco. 2. Access device web interface. 3. Navigate to Administration > Software Upgrade. 4. Upload and install new firmware. 5. Reboot device after installation.

🔧 Temporary Workarounds

Disable web management interface

all

Prevents exploitation by disabling the vulnerable HTTP server component

Configure via device CLI: no ip http server
Or via web interface: Administration > Management > disable HTTP/HTTPS

Network segmentation

all

Restrict access to management interface to trusted networks only

Configure firewall rules to block external access to port 80/443 on ATA devices
Implement VLAN segmentation for management traffic

🧯 If You Can't Patch

  • Implement strict network access controls to limit management interface exposure
  • Monitor for suspicious HTTP GET requests to device management interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (Status > System Information) or CLI (show version). If version is below 12.0(1)SR1, device is vulnerable.

Check Version:

show version (CLI) or check web interface Status > System Information

Verify Fix Applied:

Confirm firmware version is 12.0(1)SR1 or later and test that HTTP GET requests no longer cause state changes.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP GET requests to management interface
  • Multiple device reboots in short time period
  • Configuration changes from unauthenticated sources

Network Indicators:

  • HTTP GET requests with parameter manipulation to ATA management ports
  • Traffic from unexpected sources to device management interfaces

SIEM Query:

source_ip=* AND dest_port IN (80,443) AND http_method=GET AND dest_ip IN (ATA_DEVICE_IPS) AND (uri CONTAINS "reboot" OR uri CONTAINS "config")

🔗 References

📤 Share & Export