First published: Tue May 31 2011(Updated: )
The web management interface on the Cisco RVS4000 Gigabit Security Router with software 1.x before 1.3.3.4 and 2.x before 2.0.2.7, and the WRVS4400N Gigabit Security Router with software before 2.0.2.1, allows remote attackers to read the backup configuration file, and consequently execute arbitrary code, via unspecified vectors, aka Bug ID CSCtn23871.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RVS4000 Firmware | =1 | |
Cisco RVS4000 Firmware | =2 | |
Cisco RVS4000 | =1.3.0.5 | |
Cisco RVS4000 | =1.3.1.0 | |
Cisco RVS4000 | =1.3.2.0 | |
Cisco RVS4000 | =2.0.0.3 | |
Cisco WRVS4400N Firmware | =1.0 | |
Cisco WRVS4400N Firmware | =1.1 | |
Cisco WRVS4400N Firmware | =2 | |
Cisco WRVS4400N | =1.3.0.5 | |
Cisco WRVS4400N | =1.3.1.0 | |
Cisco WRVS4400N | =1.3.2.0 | |
Cisco WRVS4400N | =2.0.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1645 has a high severity rating due to its potential for remote code execution.
To fix CVE-2011-1645, upgrade your firmware to a version above 1.3.3.4 for RVS4000 or 2.0.2.1 for WRVS4400N.
CVE-2011-1645 affects the Cisco RVS4000 and WRVS4400N routers with specific firmware versions.
Yes, CVE-2011-1645 can be exploited remotely by attackers to access sensitive configuration files.
While upgrading is the recommended solution, limiting access to the router interface can serve as a temporary workaround for CVE-2011-1645.