First published: Wed Jun 19 2019(Updated: )
A vulnerability in the web interface of Cisco RV110W, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to acquire the list of devices that are connected to the guest network. The vulnerability is due to improper authorization of an HTTP request. An attacker could exploit this vulnerability by accessing a specific URI on the web interface of the router. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-rv-infodis
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV110W firmware | ||
Cisco RV130W firmware | ||
Cisco RV215W Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190619-rv-infodis is classified as a high risk due to the potential unauthorized access to sensitive network information.
cisco-sa-20190619-rv-infodis affects Cisco RV110W, RV130W, and RV215W routers by allowing attackers to view connected devices on the guest network.
To fix cisco-sa-20190619-rv-infodis, users should update their firmware to the latest version provided by Cisco.
Organizations using Cisco RV110W, RV130W, and RV215W routers are vulnerable to cisco-sa-20190619-rv-infodis.
The cisco-sa-20190619-rv-infodis vulnerability is caused by improper authorization of HTTP requests in the web interface of the affected routers.