Vulnerabilities > CVE-2002-0769 - Unspecified vulnerability in Cisco Ata-186
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The web-based configuration interface for the Cisco ATA 186 Analog Telephone Adaptor allows remote attackers to bypass authentication via an HTTP POST request with a single byte, which allows the attackers to (1) obtain the password from the login screen, or (2) reconfigure the adaptor by modifying certain request parameters.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Hardware | 1 |
Exploit-Db
description | Cisco ATA-186 HTTP Device Configuration Disclosure Vulnerability. CVE-2002-0769. Remote exploit for hardware platform |
id | EDB-ID:21441 |
last seen | 2016-02-02 |
modified | 2002-05-09 |
published | 2002-05-09 |
reporter | Patrick Michael Kane |
source | https://www.exploit-db.com/download/21441/ |
title | Cisco ATA-186 HTTP Device Configuration Disclosure Vulnerability |
Nessus
NASL family | CISCO |
NASL id | CISCO_ATA186_PASSWORD_CIRCUMVENT.NASL |
description | The remote host appears to be a Cisco ATA-186 - an analog telephone adapter used to interface analog telephones to VoIP networks. The adapter is configured via a web interface that has a security bypass vulnerability. It is possible to bypass authentication by sending an HTTP POST request with a single byte, which could allow a remote attacker to take control of the device. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11012 |
published | 2002-06-05 |
reporter | This script is Copyright (C) 2002-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11012 |
title | Cisco ATA-186 Password Circumvention / Recovery |
code |
|
References
- http://archives.neohapsis.com/archives/bugtraq/2002-05/0083.html
- http://archives.neohapsis.com/archives/bugtraq/2002-05/0083.html
- http://www.cisco.com/warp/public/707/ata186-password-disclosure.shtml
- http://www.cisco.com/warp/public/707/ata186-password-disclosure.shtml
- http://www.iss.net/security_center/static/9056.php
- http://www.iss.net/security_center/static/9056.php
- http://www.iss.net/security_center/static/9057.php
- http://www.iss.net/security_center/static/9057.php
- http://www.securityfocus.com/bid/4711
- http://www.securityfocus.com/bid/4711
- http://www.securityfocus.com/bid/4712
- http://www.securityfocus.com/bid/4712