First published: Sun Dec 13 2015(Updated: )
The random-number generator on Cisco Small Business RV routers 4.x and SA500 security appliances 2.2.07 does not have sufficient entropy, which makes it easier for remote attackers to determine a TLS key pair via unspecified computations upon handshake key-exchange data, aka Bug ID CSCus15224.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Sa520 | =2.2.07 | |
Cisco Sa520w | =2.2.07 | |
Cisco Sa540 | =2.2.07 | |
Cisco Rv016 Multi-wan Vpn Firmware | =4.0.0.7 | |
Cisco Rv016 Multi-wan Vpn Firmware | =4.0.2.8 | |
Cisco Rv016 Multi-wan Vpn Firmware | =4.0.5.0 | |
Cisco Rv042 Dual Wan Vpn Router Firmware | =4.0.2.8 | |
Cisco Rv042g Dual Gigabit Wan Vpn Firmware | =4.0.0.7 | |
Cisco Rv042g Dual Gigabit Wan Vpn Firmware | =4.2.2.7 | |
Cisco Rv042g Dual Gigabit Wan Vpn Firmware | =4.2.2.8 | |
Cisco Rv082 Dual Wan Vpn Router Firmware | =4.0.0.7 | |
Cisco Rv082 Dual Wan Vpn Router Firmware | =4.0.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.