Vulnerability Description
Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP) functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device and cause the LLDP service to restart. These vulnerabilities are due to missing length validation of certain LLDP packet header fields. An attacker could exploit these vulnerabilities by sending a malicious LLDP packet to an affected device. A successful exploit could allow the attacker to execute code on the affected device and cause LLDP to restart unexpectedly, resulting in a denial of service (DoS) condition.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Ata 190 Firmware | - |
| Cisco | Ata 190 | - |
| Cisco | Ata 191 Firmware | < 11.2.2 |
| Cisco | Ata 191 | - |
| Cisco | Ata 192 Firmware | < 11.2.2 |
| Cisco | Ata 192 | - |
Related Weaknesses (CWE)
References
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/ci
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/ci
FAQ
What is CVE-2022-20686?
CVE-2022-20686 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP) functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to execute ...
How severe is CVE-2022-20686?
CVE-2022-20686 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-20686?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ata 190 Firmware, Cisco Ata 190, Cisco Ata 191 Firmware, Cisco Ata 191, Cisco Ata 192 Firmware.