First published: Tue Nov 26 2019(Updated: )
A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.
Credit: ykramarz@cisco.com psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV series router firmware | ||
All of | ||
Cisco RV016 multi-wan vpn firmware | <4.2.3.10 | |
Cisco RV016 Multi-WAN VPN | ||
All of | ||
Cisco RV042 Dual WAN VPN Router | <4.2.3.10 | |
Cisco RV042 Dual WAN VPN Router | ||
All of | ||
Cisco RV042G dual gigabit wan vpn firmware | <4.2.3.10 | |
Cisco RV042G | ||
All of | ||
Cisco RV082 Dual WAN VPN Router Firmware | <4.2.3.10 | |
Cisco RV082 Dual WAN VPN Router | ||
Cisco RV016 multi-wan vpn firmware | <4.2.3.10 | |
Cisco RV016 Multi-WAN VPN | ||
Cisco RV042 Dual WAN VPN Router | <4.2.3.10 | |
Cisco RV042 Dual WAN VPN Router | ||
Cisco RV042G dual gigabit wan vpn firmware | <4.2.3.10 | |
Cisco RV042G | ||
Cisco RV082 Dual WAN VPN Router Firmware | <4.2.3.10 | |
Cisco RV082 Dual WAN VPN Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15271 is a vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers.
CVE-2019-15271 allows an authenticated, remote attacker to execute arbitrary commands with root privileges on affected Cisco RV Series Routers.
An attacker with either a valid credential or an active session token can exploit CVE-2019-15271.
CVE-2019-15271 has a severity rating of 8.8 (Critical).
To fix CVE-2019-15271, users should follow the guidelines provided by Cisco in their security advisory.