We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-20689



Description

Multiple vulnerabilities in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, adjacent attacker to cause Cisco Discovery Protocol memory corruption on an affected device. These vulnerabilities are due to missing length validation checks when processing Cisco Discovery Protocol messages. An attacker could exploit these vulnerabilities by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read of the valid Cisco Discovery Protocol packet data, which could allow the attacker to cause corruption in the internal Cisco Discovery Protocol database of the affected device.

Reserved 2021-11-02 | Published 2022-12-07 | Updated 2024-11-01 | Assigner cisco


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

Improper Handling of Length Parameter Inconsistency

Product status

1.2.1
affected

1.2.2 SR1
affected

1.2.2
affected

1.2.2 SR2
affected

11.1.0 MSR4
affected

11.1.0
affected

11.1.0 MSR1
affected

11.1.0 MSR2
affected

11.1.0 MSR3
affected

1.1.0
affected

1.1.1
affected

1.1.2
affected

12.0.1 SR2
affected

12.0.1
affected

12.0.1 SR1
affected

12.0.1 SR3
affected

12.0.1 SR4
affected

11.2.1
affected

References

sec.cloudapps.cisco.com/...cisco-sa-ata19x-multivuln-GEZYVvs (cisco-sa-ata19x-multivuln-GEZYVvs)

cve.org (CVE-2022-20689)

nvd.nist.gov (CVE-2022-20689)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-20689

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.