{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T04:21:31.240","vulnerabilities":[{"cve":{"id":"CVE-2019-12708","sourceIdentifier":"psirt@cisco.com","published":"2019-10-16T19:15:11.847","lastModified":"2024-11-21T04:23:24.573","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to unsafe handling of user credentials. An attacker could exploit this vulnerability by viewing portions of the web-based management interface of an affected device. A successful exploit could allow the attacker to access administrative credentials and potentially gain elevated privileges by reusing stolen credentials on the affected device."},{"lang":"es","value":"Una vulnerabilidad en la interfaz de administración basada en web de los dispositivos Cisco SPA100 Series Analog Telephone Adapters (ATAs), podría permitir a un atacante remoto autenticado acceder a información confidencial en un dispositivo afectado. La vulnerabilidad es debido a un manejo no seguro de las credenciales de usuario. Un atacante podría explotar esta vulnerabilidad al visualizar partes de la interfaz de administración basada en web de un dispositivo afectado. Una explotación con éxito podría permitir al atacante acceder a credenciales administrativas y alcanzar potencialmente privilegios elevados mediante la reutilización de credenciales robadas en el dispositivo afectado."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa112_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.1","matchCriteriaId":"CDE978DB-5C48-4E25-A67E-497F033366E1"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa112_firmware:1.4.1:-:*:*:*:*:*:*","matchCriteriaId":"CDBCF90E-2E7B-4A58-B0DF-4A02D880EF0D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr1:*:*:*:*:*:*","matchCriteriaId":"661CECD1-038C-41B1-AEB7-9C3E5087E088"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr2:*:*:*:*:*:*","matchCriteriaId":"691B5688-DDAF-49EE-8E9F-ABB06BB628B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr3:*:*:*:*:*:*","matchCriteriaId":"C4BAC9C2-3475-42EC-81FA-12BE338C936A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa112:-:*:*:*:*:*:*:*","matchCriteriaId":"F61B8649-0781-4AF5-8CED-34616A9524FF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa122_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.1","matchCriteriaId":"22E490C8-BA3D-44E0-A677-C3311489EED5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa122_firmware:1.4.1:-:*:*:*:*:*:*","matchCriteriaId":"30A5E568-2B2A-4A46-99E9-5FC203F96347"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr1:*:*:*:*:*:*","matchCriteriaId":"4A1FCBBE-9EE3-4D9D-AD25-2D4FA5893263"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr2:*:*:*:*:*:*","matchCriteriaId":"6D77D805-40B9-41F1-9A1A-C1A85E89361E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr3:*:*:*:*:*:*","matchCriteriaId":"1B7D0675-063B-45A2-985D-B32FF3D6E15B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:spa122:-:*:*:*:*:*:*:*","matchCriteriaId":"8C874C71-46D9-48A4-81C9-7ADDDB22FC8C"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-credentials","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://www.tenable.com/security/research/tra-2019-44","source":"psirt@cisco.com","tags":["Third Party Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-spa-credentials","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.tenable.com/security/research/tra-2019-44","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}