First published: Tue Mar 04 2025(Updated: )
A security vulnerability was discovered in the local status page functionality of Cisco Meraki’s MX67 and MX68 security appliance models that may allow unauthenticated individuals to access and download logs containing sensitive, privileged device information. The vulnerability is due to improper access control to the files holding debugging and maintenance information, and is only exploitable when the local status page is enabled on the device. An attacker exploiting this vulnerability may obtain access to wireless pre-shared keys, Site-to-Site VPN key and other sensitive information. Under certain circumstances, this information may allow an attacker to obtain administrative-level access to the device.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meraki MX67 Firmware | ||
Cisco Meraki MX68 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1815 is classified as a high severity vulnerability due to the potential exposure of sensitive device information.
To mitigate CVE-2019-1815, ensure that your Cisco Meraki MX67 or MX68 appliances are running the latest firmware updates provided by Cisco.
The affected products for CVE-2019-1815 are the Cisco Meraki MX67 and MX68 security appliance models.
Yes, CVE-2019-1815 can be exploited by unauthenticated individuals, allowing remote access to sensitive logs.
CVE-2019-1815 risks exposing privileged device information found in logs on the Cisco Meraki MX67 and MX68.