First published: Thu Jun 20 2019(Updated: )
A vulnerability in the web interface of Cisco RV110W, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to acquire the list of devices that are connected to the guest network. The vulnerability is due to improper authorization of an HTTP request. An attacker could exploit this vulnerability by accessing a specific URI on the web interface of the router.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV110W Wireless-N VPN Firewall Firmware | ||
Cisco RV110W firmware | ||
Cisco RV130W Firmware | ||
Cisco RV130W firmware | ||
Cisco RV215W Firmware | ||
Cisco RV215W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1899 has been classified as a medium severity vulnerability.
To fix CVE-2019-1899, you should update your Cisco RV110W, RV130W, or RV215W router to the latest firmware version.
CVE-2019-1899 affects users of the Cisco RV110W, RV130W, and RV215W routers.
The impact of CVE-2019-1899 allows an unauthenticated attacker to retrieve the list of devices connected to the guest network.
There are no official workarounds available for CVE-2019-1899, and updating the firmware is the recommended security measure.