First published: Thu Jun 18 2020(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV110W Firmware | <=1.2.2.5 | |
Cisco RV110W firmware | ||
Cisco RV130 VPN Router Firmware | <=1.0.3.54 | |
Cisco RV130W Wireless-AC VPN Router | ||
Cisco RV130W Firmware | <=1.0.3.54 | |
Cisco RV130W firmware | ||
Cisco RV215W Firmware | <=1.3.1.5 | |
Cisco RV215W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3268 is rated as high severity due to its potential for remote command execution by authenticated attackers.
To mitigate CVE-2020-3268, upgrade the firmware of affected Cisco RV110W, RV130, RV130W, and RV215W series routers to a version that addresses the vulnerabilities.
CVE-2020-3268 affects Cisco RV110W, RV130, RV130W, and RV215W Series Routers running specific firmware versions.
CVE-2020-3268 allows authenticated remote attackers to execute arbitrary commands on the affected router's management interface.
Only authenticated users with administrative privileges can exploit CVE-2020-3268 to execute arbitrary commands.