First published: Mon Aug 08 2016(Updated: )
The CLI command parser on Cisco RV110W, RV130W, and RV215W devices allows local users to execute arbitrary shell commands as an administrator via crafted parameters, aka Bug IDs CSCuv90134, CSCux58161, and CSCux73567.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV110W Wireless-N VPN Firewall Firmware | ||
Cisco Small Business RV110W Wireless-N VPN Firewall | ||
Cisco RV130W Wireless-N Multifunction VPN Router | ||
Cisco RV130W Wireless-N Multifunction VPN Router | ||
Cisco RV215W Wireless-N VPN Router Firmware | ||
Cisco RV215W Wireless-N VPN Router Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6396 is considered a high severity vulnerability due to its potential for unauthorized command execution.
To fix CVE-2015-6396, update the firmware of affected Cisco RV110W, RV130W, or RV215W devices to the latest version that addresses this vulnerability.
CVE-2015-6396 affects Cisco RV110W, RV130W, and RV215W devices running specific firmware versions.
CVE-2015-6396 requires local access for exploitation, making it a local vulnerability rather than a remote one.
The implications of CVE-2015-6396 include the potential for local users to execute arbitrary shell commands as an administrator, leading to further system compromise.