You are here
Home > Preporuke > Ranjivost Cisco RV110W, RV130W i RV215W usmjerivača

Ranjivost Cisco RV110W, RV130W i RV215W usmjerivača

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco RV110W, RV130W, and RV215W Routers Management Interface Directory Traversal Vulnerability

Advisory ID: cisco-sa-20180905-rv-routers-traversal

Revision: 1.0

For Public Release: 2018 September 5 16:00 GMT

Last Updated: 2018 September 5 16:00 GMT

CVE ID(s): CVE-2018-0426

CVSS Score v(3): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

+———————————————————————

Summary

=======

A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain access to sensitive information.

The vulnerability is due to improper validation of directory traversal character sequences within the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to the targeted device. A successful exploit could allow the attacker to gain access to arbitrary files on the affected device, resulting in the disclosure of sensitive information.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-traversal [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-traversal”]

—–BEGIN PGP SIGNATURE—–
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=6iGk
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorZvonimir Bosnjak
Cert idNCERT-REF-2018-09-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Ranjivost Cisco RV110W, RV130W i RV215W usmjerivača

Otkrivena je ranjivost u web temeljenom upravljačkom sučelju za Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router...

Close