The web-based configuration interface for the Cisco ATA 186 Analog Telephone Adaptor allows remote attackers to bypass authentication via an HTTP POST request with a single byte, which allows the attackers to (1) obtain the password from the login screen, or (2) reconfigure the adaptor by modifying certain request parameters.
References
Link | Resource |
---|---|
http://www.cisco.com/warp/public/707/ata186-password-disclosure.shtml | Vendor Advisory |
http://www.securityfocus.com/bid/4712 | Vendor Advisory |
http://www.securityfocus.com/bid/4711 | Exploit Patch Vendor Advisory |
http://www.iss.net/security_center/static/9057.php | Patch Vendor Advisory |
http://www.iss.net/security_center/static/9056.php | Patch Vendor Advisory |
http://archives.neohapsis.com/archives/bugtraq/2002-05/0083.html |
Configurations
Information
Published : 2002-08-11 21:00
Updated : 2008-09-05 13:28
NVD link : CVE-2002-0769
Mitre link : CVE-2002-0769
JSON object : View
CWE
Products Affected
cisco
- ata-186