First published: Wed Sep 05 2018(Updated: )
A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to the targeted device. A successful exploit could allow the attacker to gain access to arbitrary files on the affected device, resulting in the disclosure of sensitive information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-traversal
Credit: Qingtang Zheng 360 ESG CodeSafe Team
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Small Business RV110W Wireless-N VPN Firewall | ||
Cisco RV130W Wireless-N Multifunction VPN Router | ||
Cisco RV215W Wireless-N VPN Router Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180905-rv-routers-traversal is considered to be critical, allowing unauthorized access to sensitive information.
To fix cisco-sa-20180905-rv-routers-traversal, you should upgrade the firmware of your affected Cisco RV routers to the latest version as recommended by Cisco.
The devices affected by cisco-sa-20180905-rv-routers-traversal include Cisco RV110W, RV130W, and RV215W routers.
Due to cisco-sa-20180905-rv-routers-traversal, an attacker could exploit the vulnerability to gain unauthorized access to sensitive information.
No, authentication is not required for exploiting cisco-sa-20180905-rv-routers-traversal, allowing unauthenticated remote access.