First published: Fri Oct 05 2018(Updated: )
A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to the targeted device. A successful exploit could allow the attacker to gain access to arbitrary files on the affected device, resulting in the disclosure of sensitive information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Rv110w Firmware | <=1.2.1.7 | |
Cisco RV110W Wireless-N VPN Firewall | ||
Cisco Rv130w Firmware | <1.0.3.44 | |
Cisco RV130W | ||
Cisco Rv215w Firmware | <=1.3.0.8 | |
Cisco RV215W Wireless-N VPN Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-0426 is critical.
CVE-2018-0426 affects Cisco RV110W Firmware up to and including version 1.2.1.7, Cisco RV130W Firmware up to but not including version 1.0.3.44, and Cisco RV215W Firmware up to and including version 1.3.0.8.
An unauthenticated, remote attacker can exploit CVE-2018-0426 to gain access to sensitive information.
No, Cisco RV110W Wireless-N VPN Firewall is not vulnerable to CVE-2018-0426.
To fix CVE-2018-0426, Cisco recommends updating the firmware to the latest version available.