First published: Tue Nov 26 2019(Updated: )
A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Rv016 Multi-wan Vpn Firmware | <4.2.3.10 | |
Cisco Rv016 Multi-wan Vpn | ||
Cisco Rv042 Dual Wan Vpn Firmware | <4.2.3.10 | |
Cisco Rv042 Dual Wan Vpn | ||
Cisco Rv042g Dual Gigabit Wan Vpn Firmware | <4.2.3.10 | |
Cisco Rv042g Dual Gigabit Wan Vpn | ||
Cisco Rv082 Dual Wan Vpn Firmware | <4.2.3.10 | |
Cisco Rv082 Dual Wan Vpn | ||
Cisco RV Series Routers | ||
All of | ||
Cisco Rv016 Multi-wan Vpn | ||
Cisco Rv016 Multi-wan Vpn Firmware | <4.2.3.10 | |
All of | ||
Cisco Rv042 Dual Wan Vpn | ||
Cisco Rv042 Dual Wan Vpn Firmware | <4.2.3.10 | |
All of | ||
Cisco Rv042g Dual Gigabit Wan Vpn | ||
Cisco Rv042g Dual Gigabit Wan Vpn Firmware | <4.2.3.10 | |
All of | ||
Cisco Rv082 Dual Wan Vpn | ||
Cisco Rv082 Dual Wan Vpn Firmware | <4.2.3.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15271 is a vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers.
CVE-2019-15271 allows an authenticated, remote attacker to execute arbitrary commands with root privileges on affected Cisco RV Series Routers.
An attacker with either a valid credential or an active session token can exploit CVE-2019-15271.
CVE-2019-15271 has a severity rating of 8.8 (Critical).
To fix CVE-2019-15271, users should follow the guidelines provided by Cisco in their security advisory.