Exploited
CWE
502 20
Advisory Published
Updated

CVE-2019-15271: Cisco RV Series Routers Deserialization of Untrusted Data Vulnerability

First published: Tue Nov 26 2019(Updated: )

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.

Credit: ykramarz@cisco.com ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Rv016 Multi-wan Vpn Firmware<4.2.3.10
Cisco Rv016 Multi-wan Vpn
Cisco Rv042 Dual Wan Vpn Firmware<4.2.3.10
Cisco Rv042 Dual Wan Vpn
Cisco Rv042g Dual Gigabit Wan Vpn Firmware<4.2.3.10
Cisco Rv042g Dual Gigabit Wan Vpn
Cisco Rv082 Dual Wan Vpn Firmware<4.2.3.10
Cisco Rv082 Dual Wan Vpn
Cisco RV Series Routers
All of
Cisco Rv016 Multi-wan Vpn
Cisco Rv016 Multi-wan Vpn Firmware<4.2.3.10
All of
Cisco Rv042 Dual Wan Vpn
Cisco Rv042 Dual Wan Vpn Firmware<4.2.3.10
All of
Cisco Rv042g Dual Gigabit Wan Vpn
Cisco Rv042g Dual Gigabit Wan Vpn Firmware<4.2.3.10
All of
Cisco Rv082 Dual Wan Vpn
Cisco Rv082 Dual Wan Vpn Firmware<4.2.3.10

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2019-15271?

    CVE-2019-15271 is a vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers.

  • How does CVE-2019-15271 impact Cisco RV Series Routers?

    CVE-2019-15271 allows an authenticated, remote attacker to execute arbitrary commands with root privileges on affected Cisco RV Series Routers.

  • Who can exploit CVE-2019-15271?

    An attacker with either a valid credential or an active session token can exploit CVE-2019-15271.

  • What is the severity of CVE-2019-15271?

    CVE-2019-15271 has a severity rating of 8.8 (Critical).

  • How can I fix the vulnerability CVE-2019-15271?

    To fix CVE-2019-15271, users should follow the guidelines provided by Cisco in their security advisory.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203