cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-20461,https://securityvulnerability.io/vulnerability/CVE-2024-20461,Cisco ATA 190 Series Analog Telephone Adapter Vulnerability,"A vulnerability in the CLI of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, local attacker with high privileges to execute arbitrary commands as the root user. This vulnerability exists because CLI input is not properly sanitized. An attacker could exploit this vulnerability by sending malicious characters to the CLI. A successful exploit could allow the attacker to read and write to the underlying operating system as the root user.",Cisco,Ata 191 Firmware,6,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-16T17:15:00.000Z,0 CVE-2024-20458,https://securityvulnerability.io/vulnerability/CVE-2024-20458,Unauthenticated Remote Attacker Couldview or Delete Configuration or Change Firmware on Affected Devices,"A significant vulnerability exists in the web-based management interface of Cisco's ATA 190 Series Analog Telephone Adapter. The flaw enables an unauthenticated remote attacker to interact with specific HTTP endpoints that lack adequate authentication controls. By exploiting this vulnerability, a malicious actor could navigate to particular URLs, leading to potential viewing or deletion of device configurations. Additionally, the exploit could allow the attacker to alter the device's firmware, posing a serious risk to users and network security. Organizations utilizing affected devices are urged to assess their security posture and implement necessary measures to mitigate risks associated with this vulnerability.",Cisco,Ata 191 Firmware,8.2,HIGH,0.00046999999904073775,false,,false,false,false,,,false,false,,2024-10-16T17:15:00.000Z,0 CVE-2024-20459,https://securityvulnerability.io/vulnerability/CVE-2024-20459,Cisco ATA 190 Multiplatform Series Analog Telephone Adapter Vulnerability,"A vulnerability exists in the web-based management interface of the Cisco ATA 190 Multiplatform Series Analog Telephone Adapter firmware. This issue stems from inadequate input sanitization, which could permit an authenticated remote attacker with elevated privileges to execute arbitrary commands as the root user on the underlying operating system. By crafting a malicious request directed at the affected management interface, attackers may exploit this vulnerability to gain unauthorized access and control, posing significant risks to system integrity and security.",Cisco,Ata 191 Firmware,7.2,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-10-16T17:15:00.000Z,0