First published: Thu Jun 20 2019(Updated: )
A vulnerability in the web-based management interface of Cisco RV110W, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to disconnect clients that are connected to the guest network on an affected router. The vulnerability is due to improper authorization of an HTTP request. An attacker could exploit this vulnerability by accessing the URL for device disconnection and providing the connected device information. A successful exploit could allow the attacker to deny service to specific clients that are connected to the guest network.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV110W Wireless-N VPN Firewall Firmware | ||
Cisco RV110W firmware | ||
Cisco RV130W Firmware | ||
Cisco RV130W firmware | ||
Cisco RV215W Firmware | ||
Cisco RV215W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1897 has been classified with a medium severity level due to the potential impact on network availability.
To fix CVE-2019-1897, you should update the firmware of your Cisco RV110W, RV130W, or RV215W routers to the latest version provided by Cisco.
Users of Cisco RV110W, RV130W, and RV215W routers with outdated firmware are affected by CVE-2019-1897.
CVE-2019-1897 is caused by improper authorization within the web-based management interface of the affected Cisco routers.
No, CVE-2019-1897 does not allow unauthorized access but can enable disconnection of clients on the guest network.