First published: Thu Aug 17 2017(Updated: )
A vulnerability in the web interface of the Cisco RV340, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to access sensitive data. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to Cisco WebEx Meetings not sufficiently protecting sensitive data when responding to an HTTP request to the web interface. An attacker could exploit the vulnerability by attempting to use the HTTP protocol and looking at the data in the HTTP responses from the Cisco WebEx Meetings Server. An exploit could allow the attacker to find sensitive information about the application. Cisco Bug IDs: CSCve37988. Known Affected Releases: firmware 1.0.0.30, 1.0.0.33, 1.0.1.9, 1.0.1.16.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV340 Firmware | =1.0.0.30 | |
Cisco RV340 Firmware | =1.0.0.33 | |
Cisco RV340 Firmware | =1.0.1.9 | |
Cisco RV340 Firmware | =1.0.1.16 | |
Cisco Small Business RV340 Series Routers | ||
Cisco RV345 Firmware | =1.0.0.30 | |
Cisco RV345 Firmware | =1.0.0.33 | |
Cisco RV345 Firmware | =1.0.1.9 | |
Cisco RV345 Firmware | =1.0.1.16 | |
Cisco Small Business RV345P | ||
Cisco RV345P Firmware | =1.0.0.30 | |
Cisco RV345P Firmware | =1.0.0.33 | |
Cisco RV345P Firmware | =1.0.1.9 | |
Cisco RV345P Firmware | =1.0.1.16 | |
Cisco RV345P |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-6784 is classified as medium.
To fix CVE-2017-6784, upgrade the Cisco RV340, RV345, or RV345P firmware to a version that addresses the vulnerability.
CVE-2017-6784 affects Cisco RV340, RV345, and RV345P Dual WAN Gigabit VPN Routers running specific firmware versions.
CVE-2017-6784 can allow an unauthenticated remote attacker to access sensitive data and perform reconnaissance attacks.
CVE-2017-6784 is a remote vulnerability, allowing attackers to exploit it without authentication.