You are here
Home > Preporuke > Ranjivost Cisco RV110W, RV130W i RV215W usmjerivača

Ranjivost Cisco RV110W, RV130W i RV215W usmjerivača

  • Detalji os-a: WN7
  • Važnost: URG
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco RV110W, RV130W, and RV215W Routers Management Interface Buffer Overflow Vulnerability

Advisory ID: cisco-sa-20180905-rv-routers-overflow

Revision: 1.0

For Public Release: 2018 September 5 16:00 GMT

Last Updated: 2018 September 5 16:00 GMT

CVE ID(s): CVE-2018-0423

CVSS Score v(3): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary

=======

A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to cause a denial of service condition or to execute arbitrary code.

The vulnerability is due to improper boundary restrictions on user-supplied input in the Guest user feature of the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to a targeted device, triggering a buffer overflow condition. A successful exploit could allow the attacker to cause the device to stop responding, resulting in a denial of service condition, or could allow the attacker to execute arbitrary code.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-overflow [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-overflow”]

—–BEGIN PGP SIGNATURE—–
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=+80A
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorZvonimir Bosnjak
Cert idNCERT-REF-2018-09-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Ranjivost Cisco SD-WAN Solution proizvoda

Otkrivena je ranjivost u Zero Touch Provisioning mogućnosti kod Cisco SD-WAN Solution proizvoda uzrokovana nedostatnom validacijom certifikata od strane zahvaćenog...

Close