Security News > 2023 > May > Cisco phone adapters vulnerable to RCE attacks, no fix available
Cisco has disclosed a vulnerability in the web-based management interface of Cisco SPA112 2-Port Phone Adapters, allowing an unauthenticated, remote attacker to execute arbitrary code on the devices.
These phone adapters are a popular choice in the industry for incorporating analog phones into VoIP networks without upgrading.
Since Cisco SPA112 has reached the end of its life, it is no longer supported by the vendor and will not receive a security update.
Cisco has provided no mitigations for CVE-2023-20136.
Cisco's security bulletin aims at raising awareness of the need to replace the impacted phone adapters or implement additional security layers to protect them from attacks.
The recommended replacement model is Cisco ATA 190 Series Analog Telephone Adapter, which has a designated end-of-life date on March 31, 2024.
News URL
Related news
- Critical Ivanti RCE flaw with public exploit now used in attacks (source)
- New scanner finds Linux, UNIX servers exposed to CUPS RCE attacks (source)
- CISA says critical Fortinet RCE flaw now exploited in attacks (source)
- Samsung phone users under attack, Google warns (source)
- Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability Under Active Attack (source)
- Cisco fixes VPN DoS flaw discovered in password spray attacks (source)
- Emergency patch: Cisco fixes bug under exploit in brute-force attacks (source)
- New Cisco ASA and FTD features block VPN brute-force password attacks (source)
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)
- New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-06-28 | CVE-2023-20136 | Improper Privilege Management vulnerability in Cisco Secure Workload A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. | 6.5 |