First published: Sun Dec 13 2015(Updated: )
The random-number generator on Cisco Small Business RV routers 4.x and SA500 security appliances 2.2.07 does not have sufficient entropy, which makes it easier for remote attackers to determine a TLS key pair via unspecified computations upon handshake key-exchange data, aka Bug ID CSCus15224.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Sa520 | =2.2.07 | |
Cisco Sa520w | =2.2.07 | |
Cisco Sa540 | =2.2.07 | |
Cisco RV016 multi-wan vpn firmware | =4.0.0.7 | |
Cisco RV016 multi-wan vpn firmware | =4.0.2.8 | |
Cisco RV016 multi-wan vpn firmware | =4.0.5.0 | |
Cisco RV042 Dual WAN VPN Router | =4.0.2.8 | |
Cisco RV042G dual gigabit wan vpn firmware | =4.0.0.7 | |
Cisco RV042G dual gigabit wan vpn firmware | =4.2.2.7 | |
Cisco RV042G dual gigabit wan vpn firmware | =4.2.2.8 | |
Cisco RV082 Dual WAN VPN Router Firmware | =4.0.0.7 | |
Cisco RV082 Dual WAN VPN Router Firmware | =4.0.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.