First published: Thu Mar 06 2014(Updated: )
The web management interface on the Cisco RV110W firewall with firmware 1.2.0.9 and earlier, RV215W router with firmware 1.1.0.5 and earlier, and CVR100W router with firmware 1.0.1.19 and earlier does not prevent replaying of modified authentication requests, which allows remote attackers to obtain administrative access by leveraging the ability to intercept requests, aka Bug IDs CSCul94527, CSCum86264, and CSCum86275.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV110W Wireless-N VPN Firewall Firmware | <=1.2.0.9 | |
Cisco RV110W firmware | ||
Cisco RV215W Firmware | <=1.1.0.5 | |
Cisco RV215W Firmware | ||
Cisco CVR100W Firmware | <=1.0.1.19 | |
Cisco CVR100W firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0683 is considered a high severity vulnerability due to its potential for exploitation allowing unauthorized access.
To fix CVE-2014-0683, upgrade the affected Cisco devices to the latest firmware version that addresses the vulnerability.
CVE-2014-0683 affects the Cisco RV110W firewall, RV215W router, and CVR100W router with specific firmware versions.
CVE-2014-0683 allows remote attackers to replay modified authentication requests to gain unauthorized access.
There are no known workarounds for CVE-2014-0683; the recommended solution is to apply the firmware update.