EUVD API Documentation

Official API documentation at: https://euvd.enisa.europa.eu/apidoc.

The Quarto markdown source for this is at https://rud.is/euvd-api/euvd-api.qmd.

Frontpage

Show latest vulnerabilities

  • Endpoint: /api/lastvulnerabilities
  • Method: GET
  • Authentication: No authentication required
  • Request Headers: No custom headers
  • Request Body: Not applicable
  • Response Size Limit: Maximum 8 records

Curl Example:

curl -X GET https://euvdservices.enisa.europa.eu/api/lastvulnerabilities

HTTP Request:

GET https://euvdservices.enisa.europa.eu/api/lastvulnerabilities HTTP/1.1

Response:

[
  {
    "id": "EUVD-2025-13580",
    "description": "SQL injection in TCMAN's GIM v11. This vulnerability allows an unauthenticated attacker to inject an SQL statement to obtain, update and delete all information in the database. This vulnerability was found in each of the following parameters according to the vulnerability identifier ‘username’ parameter of the ‘GetLastDatePasswordChange’ endpoint.",
    "datePublished": "May 6, 2025, 12:30:24 PM",
    "dateUpdated": "May 13, 2025, 9:30:35 PM",
    "baseScore": 9.3,
    "baseScoreVersion": "4.0",
    "baseScoreVector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
    "references": "https://nvd.nist.gov/vuln/detail/CVE-2025-40622\nhttps://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcmans-gim\n",
    "aliases": "CVE-2025-40622\nGHSA-869c-35xf-w582\n",
    "assigner": "INCIBE",
    "epss": 0.0,
    "enisaIdProduct": [
      {
        "id": "7da6c973-b34f-3fff-9cff-af2df4ef1ab2",
        "product": {
          "name": "GIM"
        },
        "product_version": "v11"
      }
    ],
    "enisaIdVendor": [
      {
        "id": "49e22a99-88c5-3ce5-9d3f-af72c0bece80",
        "vendor": {
          "name": "TCMAN"
        }
      }
    ]
  }
]

Show latest exploited vulnerabilities

  • Endpoint: /api/exploitedvulnerabilities
  • Method: GET
  • Authentication: No authentication required
  • Request Headers: No custom headers
  • Request Body: Not applicable
  • Response Size Limit: Maximum 8 records

Curl Example:

curl -X GET https://euvdservices.enisa.europa.eu/api/exploitedvulnerabilities

HTTP Request:

GET https://euvdservices.enisa.europa.eu/api/exploitedvulnerabilities HTTP/1.1

Response:

[
  {
    "id": "EUVD-2024-33664",
    "description": "Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.",
    "datePublished": "Nov 15, 2024, 2:00:27 AM",
    "dateUpdated": "May 7, 2025, 10:20:22 PM",
    "baseScore": 9.8,
    "baseScoreVersion": "3.1",
    "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "references": "https://www.twcert.org.tw/tw/cp-132-8236-d4836-1.html\nhttps://www.twcert.org.tw/en/cp-139-8237-26d7a-2.html\n",
    "aliases": "CVE-2024-11120\n",
    "assigner": "twcert",
    "epss": 14.85,
    "exploitedSince": "May 7, 2025, 12:00:00 AM",
    "enisaIdProduct": [
      {
        "id": "3fc65b8a-eed0-3efd-91d0-70e71e490a08",
        "product": {
          "name": "GVLX 4 V2"
        },
        "product_version": "0"
      },
      {
        "id": "7f4d821c-54ec-3d9f-949e-c9fbeda104a3",
        "product": {
          "name": "GV-VS11"
        },
        "product_version": "0"
      },
      {
        "id": "8628b173-6ab5-3242-80b9-efd269390f6f",
        "product": {
          "name": "GVLX 4 V3"
        },
        "product_version": "0"
      },
      {
        "id": "8db519df-056d-3932-a993-e905ebd17644",
        "product": {
          "name": "GV-VS12"
        },
        "product_version": "0"
      },
      {
        "id": "fa5aec10-1121-3f24-bb24-0c786dd07d4f",
        "product": {
          "name": "GV-DSP_LPR_V3"
        },
        "product_version": "0"
      }
    ],
    "enisaIdVendor": [
      {
        "id": "cafca755-d16b-355f-83cc-12a85c2e3878",
        "vendor": {
          "name": "GeoVision"
        }
      }
    ]
  }
]

Show latest critical vulnerabilities

  • Endpoint: /api/criticalvulnerabilities
  • Method: GET
  • Authentication: No authentication required
  • Request Headers: No custom headers
  • Request Body: Not applicable
  • Response Size Limit: Maximum 8 records

Curl Example:

curl -X GET https://euvdservices.enisa.europa.eu/api/criticalvulnerabilities

HTTP Request:

GET https://euvdservices.enisa.europa.eu/api/criticalvulnerabilities HTTP/1.1

Response:

[
  {
    "id": "EUVD-2025-14047",
    "description": "Server-Side Request Forgery (SSRF) in Microsoft Power Apps allows an unauthorized attacker to disclose information over a network",
    "datePublished": "May 8, 2025, 10:17:26 PM",
    "dateUpdated": "May 13, 2025, 10:38:11 PM",
    "baseScore": 9.1,
    "baseScoreVersion": "3.1",
    "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
    "references": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47733\n",
    "aliases": "CVE-2025-47733\n",
    "assigner": "microsoft",
    "epss": 0.0,
    "enisaIdProduct": [
      {
        "id": "70c648f8-ed6d-3b6e-a68c-f05978c0b110",
        "product": {
          "name": "Microsoft Power Apps"
        },
        "product_version": "N/A"
      }
    ],
    "enisaIdVendor": [
      {
        "id": "5a1187af-81f0-3fdf-80c0-aeb06726aa9c",
        "vendor": {
          "name": "Microsoft"
        }
      }
    ]
  }
]

Scores & Filters

Query Vulnerabilities with Flexible Filters

  • Endpoint: /api/vulnerabilities
  • Method: GET
  • Authentication: No authentication required
  • Request Headers: No custom headers
  • Request Body: Not applicable
  • Response Size Limit: Maximum 100 records per request

Parameters:

  • fromScore (0-10, e.g., fromScore=7.5)
  • toScore (0-10, e.g., toScore=10)
  • fromEpss (0-100, e.g., fromEpss=20)
  • toEpss (0-100, e.g., toEpss=90)
  • fromDate (YYYY-MM-DD, e.g., fromDate=2023-01-14)
  • toDate (YYYY-MM-DD, e.g., toDate=2025-01-14)
  • product (string, e.g., product=Windows)
  • vendor (string, e.g., vendor=Microsoft)
  • assigner (string, e.g., assigner=mitre)
  • exploited (true/false, e.g., exploited=true)
  • page (integer, starts at 0, e.g., page=2)
  • text (keywords, e.g., text=vulnerability)
  • size (integer, default 10, e.g., size=100 (max))

Curl Example:

curl -X GET "https://euvdservices.enisa.europa.eu/api/vulnerabilities?fromScore=8&toScore=10&exploited=true&text=remote"

HTTP Request:

GET https://euvdservices.enisa.europa.eu/api/vulnerabilities??fromScore=8&toScore=10&exploited=true&text=remote HTTP/1.1

Response:

{
  "items": [
    {
      "id": "EUVD-2025-12275",
      "description": "The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP.\n\n\n\n\n\nThis issue affects Command Center Innovation Release: 11.38.",
      "datePublished": "Apr 22, 2025, 6:32:12 PM",
      "dateUpdated": "May 8, 2025, 12:31:11 AM",
      "baseScore": 10.0,
      "baseScoreVersion": "3.1",
      "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
      "references": "https://nvd.nist.gov/vuln/detail/CVE-2025-34028\nhttps://documentation.commvault.com/securityadvisories/CV_2025_04_1.html\nhttps://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/\nhttps://github.com/watchtowrlabs/watchTowr-vs-Commvault-PreAuth-RCE-CVE-2025-34028\n",
      "aliases": "CVE-2025-34028\nGHSA-6q9c-pjw5-5rjm\n",
      "assigner": "VulnCheck",
      "epss": 0.0,
      "exploitedSince": "May 2, 2025, 12:00:00 AM",
      "enisaIdProduct": [
        {
          "id": "c8517622-3169-3e24-8c02-0d5735113512",
          "product": {
            "name": "Command Center Innovation Release"
          },
          "product_version": "11.38"
        }
      ],
      "enisaIdVendor": [
        {
          "id": "a685b1ed-edc8-3174-aa4c-d2def9a14414",
          "vendor": {
            "name": "Commvault"
          }
        }
      ]
    }
  ],
  "total": 38
}

Specific Resources

Show EUVD by ID

  • Endpoint: /api/enisaid
  • Method: GET
  • Authentication: No authentication required
  • Request Headers: No custom headers
  • Request Body: Not applicable

Parameters:

  • id (string, e.g., id=EUVD-2025-4893)

Curl Example:

curl -X GET https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2024-45012

HTTP Request:

GET https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2024-45012 HTTP/1.1

Response:

{
  "id": "EUVD-2024-45012",
  "description": "A SQL Injection was found in /admin/admin_user.php in kashipara E-learning Management System Project 1.0 via the username and password parameters.",
  "datePublished": "Nov 14, 2024, 12:00:00 AM",
  "dateUpdated": "Nov 15, 2024, 7:18:35 PM",
  "baseScore": -1.0,
  "references": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/SQL%20Injection%20-%20admin%20user.pdf\n",
  "aliases": "CVE-2024-50831\n",
  "assigner": "mitre",
  "epss": 0.05,
  "enisaIdProduct": [
    {
      "id": "6559b1bb-acb1-38a7-a753-49cfa5c2aa79",
      "product": {
        "name": "n/a"
      },
      "product_version": "n/a"
    }
  ],
  "enisaIdVendor": [
    {
      "id": "7fc6ff25-463c-357e-ac34-3e7261566f5c",
      "vendor": {
        "name": "n/a"
      }
    }
  ],
  "enisaIdVulnerability": [
    {
      "id": "ab7bf03b-77bd-3f2f-bd2b-5ce17d5262d6",
      "vulnerability": {
        "id": "CVE-2024-50831",
        "description": "A SQL Injection was found in /admin/admin_user.php in kashipara E-learning Management System Project 1.0 via the username and password parameters.",
        "datePublished": "Nov 14, 2024, 12:00:00 AM",
        "dateUpdated": "Nov 15, 2024, 7:18:35 PM",
        "status": "PUBLISHED",
        "baseScore": -1.0,
        "references": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/SQL%20Injection%20-%20admin%20user.pdf\n",
        "enisa_id": "EUVD-2024-45012\n",
        "assigner": "mitre",
        "epss": 0.05,
        "vulnerabilityProduct": [
          {
            "id": "c799a1dd-abd7-3515-a8be-ae3b92cdcf7e",
            "product": {
              "name": "n/a"
            },
            "product_version": "n/a"
          }
        ],
        "vulnerabilityVendor": [
          {
            "id": "0444d96e-4f78-3efa-a914-67d5df2c50fb",
            "vendor": {
              "name": "n/a"
            }
          }
        ]
      }
    }
  ],
  "enisaIdAdvisory": []
}

Show vulnerability by ID

  • Endpoint: /api/vulnerability
  • Method: GET
  • Authentication: No authentication required
  • Request Headers: No custom headers
  • Request Body: Not applicable

Parameters:

  • id (string, e.g., id=CVE-2025-24054)

Curl Example:

curl -X GET "https://euvdservices.enisa.europa.eu/api/vulnerability?id=CVE-2024-0864"

HTTP Request:

GET https://euvdservices.enisa.europa.eu/api/vulnerability?id=CVE-2024-0864 HTTP/1.1

Response:

{
  "id": "CVE-2024-0864",
  "description": "Enabling Simple Ajax Uploader plugin included in Laragon open-source software allows for a remote code execution (RCE) attack via an improper input validation in a file_upload.php file which serves as an example.\nBy default, Laragon is not vulnerable until a user decides to use the aforementioned plugin.",
  "datePublished": "Feb 29, 2024, 12:56:23 PM",
  "dateUpdated": "Oct 10, 2024, 3:36:13 PM",
  "status": "PUBLISHED",
  "baseScore": -1.0,
  "references": "https://laragon.org/\nhttps://cert.pl/en/posts/2024/02/CVE-2024-0864\nhttps://cert.pl/posts/2024/02/CVE-2024-0864\n",
  "enisa_id": "EUVD-2024-16647\n",
  "assigner": "CERT-PL",
  "epss": 1.65,
  "vulnerabilityProduct": [
    {
      "id": "7eb835e1-c241-3c13-934c-95efb28a6d2f",
      "product": {
        "name": "Laragon"
      },
      "product_version": "0 ≤*"
    }
  ],
  "vulnerabilityVendor": [
    {
      "id": "3cc6d431-4f71-3c2a-9851-2fb74df81608",
      "vendor": {
        "name": "Leo Khoa"
      }
    }
  ],
  "vulnerabilityAdvisory": []
}

Show advisory by ID

  • Endpoint: /api/advisory
  • Method: GET
  • Authentication: No authentication required
  • Request Headers: No custom headers
  • Request Body: Not applicable

Parameters:

  • id (string, e.g., id=oxas-adv-2024-0002)

Curl Example:

curl -X GET "https://euvdservices.enisa.europa.eu/api/advisory?id=cisco-sa-ata19x-multi-RDTEqRsy"

HTTP Request:

GET https://euvdservices.enisa.europa.eu/api/advisory?id=cisco-sa-ata19x-multi-RDTEqRsy HTTP/1.1

Response:

{
  "id": "cisco-sa-ata19x-multi-RDTEqRsy",
  "description": "Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities",
  "summary": "Multiple vulnerabilities in Cisco ATA 190 Series Analog Telephone Adapter firmware, both on-premises and multiplatform, could allow a remote attacker to delete or change the configuration, execute commands as the root user, conduct a cross-site scripting (XSS) attack against a user of the interface, view passwords, conduct a cross-site request forgery (CSRF) attack, or reboot the device.\r\n\r\nFor more information about these vulnerabilities, see the Details [\"#details\"] section of this advisory.\r\n\r\nCisco has released firmware updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. However, there is a mitigation that addresses some of these vulnerabilities for Cisco ATA 191 on-premises firmware only.\r\n\r\n",
  "datePublished": "Oct 16, 2024, 4:00:00 PM",
  "dateUpdated": "Oct 24, 2024, 11:47:37 AM",
  "baseScore": 0.0,
  "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
  "aliases": "CVE-2024-20420\nCVE-2024-20459\nCVE-2024-20460\nCVE-2024-20421\nCVE-2024-20463\nCVE-2024-20458\nCVE-2024-20462\nCVE-2024-20461\n",
  "source": {
    "id": 10,
    "name": "csaf_cisco"
  },
  "advisoryProduct": [
    {
      "id": "5fe32ac4-e2d7-36d8-93f5-df5dde4f4a9a",
      "product": {
        "name": "Cisco Analog Telephone Adaptor (ATA) Software"
      }
    }
  ],
  "enisaIdAdvisories": [
    {
      "id": "129758d0-efa1-3f4f-b23f-4a0f2de21a93",
      "enisaId": {
        "id": "EUVD-2024-18178",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to modify the configuration or reboot an affected device.\r\n\r\nThis vulnerability is due to the HTTP server allowing state changes in GET requests. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface on an affected device. A successful exploit could allow the attacker to make limited modifications to the configuration or reboot the device, resulting in a denial of service (DoS) condition. ",
        "datePublished": "Oct 16, 2024, 4:16:53 PM",
        "dateUpdated": "Oct 31, 2024, 1:08:14 PM",
        "baseScore": 5.4,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "aliases": "CVE-2024-20463\nGSD-2024-20463\n",
        "assigner": "cisco",
        "epss": 0.21,
        "enisaIdVendor": [
          {
            "id": "40bd26b4-ff0b-3a65-a207-2aa2f5490e46",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "2a06bc1a-1ac2-3ec3-88ab-d9a62d5c6b6b",
      "enisaId": {
        "id": "EUVD-2024-18135",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with low privileges to run commands as an Admin user. \r\n\r\nThis vulnerability is due to incorrect authorization verification by the HTTP server. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to run commands as the Admin user.",
        "datePublished": "Oct 16, 2024, 4:15:45 PM",
        "dateUpdated": "Oct 31, 2024, 1:12:38 PM",
        "baseScore": 5.4,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "aliases": "CVE-2024-20420\nGSD-2024-20420\n",
        "assigner": "cisco",
        "epss": 0.08,
        "enisaIdVendor": [
          {
            "id": "20b816ba-1e0a-33f8-9651-c6085d020a10",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "8820ad84-4029-3c96-a142-8b386e6ab2eb",
      "enisaId": {
        "id": "EUVD-2024-18174",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Multiplatform Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with high privileges to execute arbitrary commands as the root user on the underlying operating system.\r\n\r\nThis vulnerability is due to a lack of input sanitization in the web-based management interface. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user.",
        "datePublished": "Oct 16, 2024, 4:16:12 PM",
        "dateUpdated": "Oct 16, 2024, 5:56:02 PM",
        "baseScore": 6.5,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "aliases": "CVE-2024-20459\nGSD-2024-20459\n",
        "assigner": "cisco",
        "epss": 0.11,
        "enisaIdVendor": [
          {
            "id": "269948fa-490a-3f87-8bfc-5f76a103ce1d",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "a7226346-69e1-3ad2-9497-0b8044ffe774",
      "enisaId": {
        "id": "EUVD-2024-18173",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to view or delete the configuration or change the firmware on an affected device.\r\n\r\nThis vulnerability is due to a lack of authentication on specific HTTP endpoints. An attacker could exploit this vulnerability by browsing to a specific URL. A successful exploit could allow the attacker to view or delete the configuration or change the firmware.",
        "datePublished": "Oct 16, 2024, 4:16:04 PM",
        "dateUpdated": "Oct 16, 2024, 7:38:32 PM",
        "baseScore": 8.2,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "aliases": "CVE-2024-20458\nGSD-2024-20458\n",
        "assigner": "cisco",
        "epss": 0.54,
        "enisaIdVendor": [
          {
            "id": "ded05373-e23c-35ba-8a47-fb0d8e246800",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "b050e851-091e-326a-a285-fdf043d2093f",
      "enisaId": {
        "id": "EUVD-2024-18176",
        "description": "A vulnerability in the CLI of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, local attacker with high privileges to execute arbitrary commands as the root user.\r\n\r\nThis vulnerability exists because CLI input is not properly sanitized. An attacker could exploit this vulnerability by sending malicious characters to the CLI. A successful exploit could allow the attacker to read and write to the underlying operating system as the root user.",
        "datePublished": "Oct 16, 2024, 4:16:34 PM",
        "dateUpdated": "Oct 16, 2024, 7:39:07 PM",
        "baseScore": 6.0,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "aliases": "CVE-2024-20461\nGSD-2024-20461\n",
        "assigner": "cisco",
        "epss": 0.05,
        "enisaIdVendor": [
          {
            "id": "0b0acc45-a727-3c1d-bf4f-599137a6367b",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "c626a171-4188-36c2-9859-da31dec5f01f",
      "enisaId": {
        "id": "EUVD-2024-18136",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device.\r\n\r\nThis vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user.",
        "datePublished": "Oct 16, 2024, 4:15:54 PM",
        "dateUpdated": "Oct 31, 2024, 1:49:46 PM",
        "baseScore": 7.1,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "aliases": "CVE-2024-20421\nGSD-2024-20421\n",
        "assigner": "cisco",
        "epss": 0.07,
        "enisaIdVendor": [
          {
            "id": "6c4ce124-0c04-3178-99c3-c4b16e37b8e0",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "cf574381-c186-3cca-bf0b-5c65e51fc6e9",
      "enisaId": {
        "id": "EUVD-2024-18175",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information on an affected device.",
        "datePublished": "Oct 16, 2024, 4:16:23 PM",
        "dateUpdated": "Oct 31, 2024, 2:10:45 PM",
        "baseScore": 6.1,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "aliases": "CVE-2024-20460\nGSD-2024-20460\n",
        "assigner": "cisco",
        "epss": 0.04,
        "enisaIdVendor": [
          {
            "id": "4b208cfd-7a4a-3538-89b1-9cb69c401c68",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "d0d56cf9-dbf7-31f5-9c96-df95f5c8efc3",
      "enisaId": {
        "id": "EUVD-2024-18177",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Multiplatform Analog Telephone Adapter firmware could allow an authenticated, local attacker with low privileges to view passwords on an affected device.\r\n\r\nThis vulnerability is due to incorrect sanitization of HTML content from an affected device. A successful exploit could allow the attacker to view passwords that belong to other users.",
        "datePublished": "Oct 16, 2024, 4:16:44 PM",
        "dateUpdated": "Oct 31, 2024, 1:17:38 PM",
        "baseScore": 5.5,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "aliases": "CVE-2024-20462\nGSD-2024-20462\n",
        "assigner": "cisco",
        "epss": 0.03,
        "enisaIdVendor": [
          {
            "id": "0921077e-bf8e-388f-93fc-e677bd02e8ae",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    }
  ],
  "vulnerabilityAdvisory": [
    {
      "id": "63ee6b0c-b082-3fd7-b48c-974cff2a406f",
      "vulnerability": {
        "id": "CVE-2024-20420",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with low privileges to run commands as an Admin user. \r\n\r\nThis vulnerability is due to incorrect authorization verification by the HTTP server. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to run commands as the Admin user.",
        "datePublished": "Oct 16, 2024, 4:15:45 PM",
        "dateUpdated": "Oct 31, 2024, 1:12:38 PM",
        "status": "PUBLISHED",
        "baseScore": 5.4,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "enisa_id": "EUVD-2024-18135\n",
        "assigner": "cisco",
        "epss": 0.08,
        "vulnerabilityVendor": [
          {
            "id": "5d2d17dc-a5bc-3e1e-9d97-493b840b625d",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "7a503bec-e7a3-3624-baaf-193cf775ffd0",
      "vulnerability": {
        "id": "CVE-2024-20461",
        "description": "A vulnerability in the CLI of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated, local attacker with high privileges to execute arbitrary commands as the root user.\r\n\r\nThis vulnerability exists because CLI input is not properly sanitized. An attacker could exploit this vulnerability by sending malicious characters to the CLI. A successful exploit could allow the attacker to read and write to the underlying operating system as the root user.",
        "datePublished": "Oct 16, 2024, 4:16:34 PM",
        "dateUpdated": "Oct 16, 2024, 7:39:07 PM",
        "status": "PUBLISHED",
        "baseScore": 6.0,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "enisa_id": "EUVD-2024-18176\n",
        "assigner": "cisco",
        "epss": 0.05,
        "vulnerabilityVendor": [
          {
            "id": "6bc17203-e7c5-3f37-a3de-6194d86cd9c2",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "7d6d1245-7d47-36a8-a8ba-1cd259d58b69",
      "vulnerability": {
        "id": "CVE-2024-20459",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Multiplatform Series Analog Telephone Adapter firmware could allow an authenticated, remote attacker with high privileges to execute arbitrary commands as the root user on the underlying operating system.\r\n\r\nThis vulnerability is due to a lack of input sanitization in the web-based management interface. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user.",
        "datePublished": "Oct 16, 2024, 4:16:12 PM",
        "dateUpdated": "Oct 16, 2024, 5:56:02 PM",
        "status": "PUBLISHED",
        "baseScore": 6.5,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "enisa_id": "EUVD-2024-18174\n",
        "assigner": "cisco",
        "epss": 0.11,
        "vulnerabilityVendor": [
          {
            "id": "7164aa6d-ac6d-39d9-a07c-b5b3f181824d",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "884c695d-73fd-3cb2-a122-6f4fc3d7acf8",
      "vulnerability": {
        "id": "CVE-2024-20421",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device.\r\n\r\nThis vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user.",
        "datePublished": "Oct 16, 2024, 4:15:54 PM",
        "dateUpdated": "Oct 31, 2024, 1:49:46 PM",
        "status": "PUBLISHED",
        "baseScore": 7.1,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "enisa_id": "EUVD-2024-18136\n",
        "assigner": "cisco",
        "epss": 0.07,
        "vulnerabilityVendor": [
          {
            "id": "b82d9e49-fea5-3d11-8779-6d5404d1e727",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "966a2969-6658-3bb5-a6b7-8b1c606addaf",
      "vulnerability": {
        "id": "CVE-2024-20462",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Multiplatform Analog Telephone Adapter firmware could allow an authenticated, local attacker with low privileges to view passwords on an affected device.\r\n\r\nThis vulnerability is due to incorrect sanitization of HTML content from an affected device. A successful exploit could allow the attacker to view passwords that belong to other users.",
        "datePublished": "Oct 16, 2024, 4:16:44 PM",
        "dateUpdated": "Oct 31, 2024, 1:17:38 PM",
        "status": "PUBLISHED",
        "baseScore": 5.5,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "enisa_id": "EUVD-2024-18177\n",
        "assigner": "cisco",
        "epss": 0.03,
        "vulnerabilityVendor": [
          {
            "id": "0e978224-181a-3ba3-ae4a-88f2af126f65",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "a1a0e7cb-99a7-3f27-af37-68337e56b22b",
      "vulnerability": {
        "id": "CVE-2024-20460",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information on an affected device.",
        "datePublished": "Oct 16, 2024, 4:16:23 PM",
        "dateUpdated": "Oct 31, 2024, 2:10:45 PM",
        "status": "PUBLISHED",
        "baseScore": 6.1,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "enisa_id": "EUVD-2024-18175\n",
        "assigner": "cisco",
        "epss": 0.04,
        "vulnerabilityVendor": [
          {
            "id": "926ba021-503b-3cd2-88e3-5a0c06724163",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "b8f9e788-85a9-3cac-8670-ce983b0a7cd0",
      "vulnerability": {
        "id": "CVE-2024-20458",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to view or delete the configuration or change the firmware on an affected device.\r\n\r\nThis vulnerability is due to a lack of authentication on specific HTTP endpoints. An attacker could exploit this vulnerability by browsing to a specific URL. A successful exploit could allow the attacker to view or delete the configuration or change the firmware.",
        "datePublished": "Oct 16, 2024, 4:16:04 PM",
        "dateUpdated": "Oct 16, 2024, 7:38:32 PM",
        "status": "PUBLISHED",
        "baseScore": 8.2,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "enisa_id": "EUVD-2024-18173\n",
        "assigner": "cisco",
        "epss": 0.54,
        "vulnerabilityVendor": [
          {
            "id": "c85e242f-00d9-3364-8965-9c415c1ca840",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    },
    {
      "id": "c4aa5a7b-5f2b-3a96-9d6b-fb5feb5d7549",
      "vulnerability": {
        "id": "CVE-2024-20463",
        "description": "A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to modify the configuration or reboot an affected device.\r\n\r\nThis vulnerability is due to the HTTP server allowing state changes in GET requests. An attacker could exploit this vulnerability by sending a malicious request to the web-based management interface on an affected device. A successful exploit could allow the attacker to make limited modifications to the configuration or reboot the device, resulting in a denial of service (DoS) condition. ",
        "datePublished": "Oct 16, 2024, 4:16:53 PM",
        "dateUpdated": "Oct 31, 2024, 1:08:14 PM",
        "status": "PUBLISHED",
        "baseScore": 5.4,
        "baseScoreVersion": "3.1",
        "baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
        "references": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy\n",
        "enisa_id": "EUVD-2024-18178\n",
        "assigner": "cisco",
        "epss": 0.21,
        "vulnerabilityVendor": [
          {
            "id": "c104278d-cb59-3fd1-b8df-8f970eb07042",
            "vendor": {
              "name": "Cisco"
            }
          }
        ]
      }
    }
  ]
}

© 2025 by the European Union Agency for Cybersecurity (ENISA)