Denial of Service in Cisco ATA 190 Series Adaptive Telephone Adapter
CVE-2022-20691

5.3MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
12 December 2022

Badges

👾 Exploit Exists

Summary

A flaw in the Cisco Discovery Protocol functionality of the Cisco ATA 190 Series Adaptive Telephone Adapter firmware enables an unauthenticated adjacent attacker to trigger a Denial of Service (DoS) condition on the device. This occurs due to inadequate validation of the length of certain fields within the Cisco Discovery Protocol packet headers. An attacker can exploit this vulnerability by sending specially crafted Cisco Discovery Protocol packets to the vulnerable device. If successful, this attack can lead to excessive memory usage, resulting in the device becoming unresponsive and potentially requiring a restart. Cisco has made firmware updates available to mitigate this vulnerability.

Affected Version(s)

Cisco Analog Telephone Adaptor (ATA) Software 1.2.1

Cisco Analog Telephone Adaptor (ATA) Software 1.2.2 SR1

Cisco Analog Telephone Adaptor (ATA) Software 1.2.2

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.