First published: Wed Nov 06 2019(Updated: )
A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbrv-cmd-x
Credit: security researcher Michel Gaschet--Clousier Orange Cyberd
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Small Business RV016 Router | ||
Cisco Small Business RV042 Router | ||
Cisco Small Business RV042G | ||
Cisco Small Business RV082 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco-SA-20191106-SBRV-CMD-X is classified as high due to the potential for remote command execution with root privileges.
To fix Cisco-SA-20191106-SBRV-CMD-X, update your affected Cisco Small Business RV Series Router to the latest software version recommended by Cisco.
Cisco-SA-20191106-SBRV-CMD-X affects various models including the Cisco Small Business RV016, RV042, RV042G, and RV082 routers.
No, an attacker must have valid credentials or an active session token to exploit Cisco-SA-20191106-SBRV-CMD-X.
To mitigate risks, ensure that your routers use strong, unique passwords and limit remote management access.