First published: Sun Dec 13 2015(Updated: )
The random-number generator on Cisco Small Business RV routers 4.x and SA500 security appliances 2.2.07 does not have sufficient entropy, which makes it easier for remote attackers to determine a TLS key pair via unspecified computations upon handshake key-exchange data, aka Bug ID CSCus15224.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SA520W | =2.2.07 | |
Cisco SA520W | =2.2.07 | |
Cisco SA540 | =2.2.07 | |
Cisco RV016 Multi-WAN VPN Firmware | =4.0.0.7 | |
Cisco RV016 Multi-WAN VPN Firmware | =4.0.2.8 | |
Cisco RV016 Multi-WAN VPN Firmware | =4.0.5.0 | |
Cisco RV042 Dual WAN VPN Router | =4.0.2.8 | |
Cisco RV042G Firmware | =4.0.0.7 | |
Cisco RV042G Firmware | =4.2.2.7 | |
Cisco RV042G Firmware | =4.2.2.8 | |
Cisco RV Series Router Firmware | =4.0.0.7 | |
Cisco RV Series Router Firmware | =4.0.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6418 is classified as a medium severity vulnerability due to its potential impact on encryption keys.
To mitigate CVE-2015-6418, it's recommended to update affected Cisco devices to the latest firmware version that addresses this vulnerability.
CVE-2015-6418 affects Cisco Small Business RV routers 4.x and SA500 security appliances running specific firmware versions.
CVE-2015-6418 exploits a weakness in the random number generator, allowing attackers to potentially derive TLS key pairs.
No specific workaround is documented for CVE-2015-6418; the primary method of remediation is through firmware updates.