We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-20691



Assignercisco
Reserved2021-11-02
Published2022-12-07
Updated2024-08-03

Description

A vulnerability in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Adaptive Telephone Adapter firmware could allow an unauthenticated, adjacent attacker to cause a DoS condition of an affected device. This vulnerability is due to missing length validation of certain Cisco Discovery Protocol packet header fields. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol packets to an affected device. A successful exploit could allow the attacker to cause the device to exhaust available memory and cause the service to restart. Cisco has released firmware updates that address this vulnerability.



MEDIUM: 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Product status

1.2.1
affected

1.2.2 SR1
affected

1.2.2
affected

1.2.2 SR2
affected

11.1.0 MSR4
affected

11.1.0
affected

11.1.0 MSR1
affected

11.1.0 MSR2
affected

11.1.0 MSR3
affected

1.1.0
affected

1.1.1
affected

1.1(4)
affected

1.1.2
affected

2.1(6)
affected

2.1(5)
affected

2.16(2)
affected

2.16(1)
affected

3.2(0)
affected

3.2(4)
affected

3.2(3)
affected

3.2(1)
affected

2.15
affected

2.14
affected

1.34
affected

1.0(0)
affected

3.1(1)
affected

3.1(0)
affected

3.1(2)
affected

3.0(0)
affected

9.2(3)
affected

9.2(1)
affected

9.0(3)
affected

12.0.1 SR2
affected

12.0.1
affected

12.0.1 SR1
affected

12.0.1 SR3
affected

12.0.1 SR4
affected

11.2.1
affected

References

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs (cisco-sa-ata19x-multivuln-GEZYVvs)

cve.org CVE-2022-20691

nvd.nist.gov CVE-2022-20691

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-20691

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.