First published: Sun Jan 12 2014(Updated: )
The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RVS4000 | <=2.0.3.2 | |
Cisco RVS4000 | =1.3.2.0 | |
Cisco RVS4000 | =1.3.3.5 | |
Cisco RVS4000 | =2.0.0.3 | |
Cisco RVS4000 | =2.0.2.7 | |
Cisco RVS4000 Firmware | ||
Cisco WRVS4400N | =1.1.03 | |
Cisco WRVS4400N | =1.1.13 | |
Cisco WRVS4400N | =2.0.1.3 | |
Cisco WRVS4400N | =2.0.2.1 | |
Cisco WRVS4400N Wireless-N Gigabit Security Router | ||
Cisco WAP4410N Firmware | <=2.0.6.1 | |
Cisco WAP4410N Firmware | =2.0.2.1 | |
Cisco WAP4410N Firmware | =2.0.3.3 | |
Cisco WAP4410N Firmware | =2.0.4.2 | |
Cisco WAP4410N Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0659 has a high CVSS score due to its potential for unauthorized access to sensitive configuration and credential data.
To fix CVE-2014-0659, update the firmware of the affected Cisco devices to the latest available version.
CVE-2014-0659 affects the Cisco WAP4410N, WRVS4400N, and RVS4000 devices with specific firmware versions.
Yes, CVE-2014-0659 can be exploited remotely, allowing attackers to read credentials and execute commands without physical access.
CVE-2014-0659 represents a number of vulnerabilities that involve improper input validation and lack of authentication for sensitive operations.