{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T06:55:08.501","vulnerabilities":[{"cve":{"id":"CVE-2024-20461","sourceIdentifier":"psirt@cisco.com","published":"2024-10-16T17:15:15.127","lastModified":"2024-10-22T18:26:01.890","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the CLI&nbsp;of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, local attacker with high privileges to execute arbitrary commands as the root user.\r\n\r\nThis vulnerability exists because CLI input is not properly sanitized. An attacker could exploit this vulnerability by sending malicious characters to the CLI. A successful exploit could allow the attacker to read and write to the underlying operating system as the root user."},{"lang":"es","value":"Una vulnerabilidad en la CLI del firmware del adaptador telefónico analógico Cisco ATA 190 Series podría permitir que un atacante local autenticado con privilegios elevados ejecute comandos arbitrarios como usuario raíz. Esta vulnerabilidad existe porque la entrada de la CLI no se desinfecta correctamente. Un atacante podría aprovechar esta vulnerabilidad enviando caracteres maliciosos a la CLI. Una explotación exitosa podría permitir al atacante leer y escribir en el sistema operativo subyacente como usuario raíz."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":6.0,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":6.0,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.8,"impactScore":5.2}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"12.0.2","matchCriteriaId":"E464918E-6409-4ACC-B27A-ECD7A5A5ABF8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*","matchCriteriaId":"2BBB1A29-ABF8-4F79-A436-A416FAF4E7A9"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"11.2.5","matchCriteriaId":"8FA479CC-10DC-4B3A-A869-7E0CCD02C959"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*","matchCriteriaId":"B0C232BB-005C-4E04-9B99-2B01AC8E8BA1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"11.2.5","matchCriteriaId":"7B66D888-565A-4EB1-B19B-594B302AAA72"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*","matchCriteriaId":"00A3390F-594D-4DB2-96EC-04D0D73C9421"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy","source":"psirt@cisco.com","tags":["Vendor Advisory"]}]}}]}