All the vulnerabilites related to cisco - rv120w
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | rv120w_firmware | * | |
cisco | rv120w | - | |
cisco | rv220w_firmware | * | |
cisco | rv220w | - | |
cisco | rv180_firmware | * | |
cisco | rv180 | - | |
cisco | rv180w | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv120w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAE232F2-B674-40E7-A96D-A1AC07CB84B7", "versionEndIncluding": "1.0.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv120w:-:*:*:*:*:*:*:*", "matchCriteriaId": "40465CA8-BE8B-4F15-8578-D8972C241D84", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv220w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5EB99F-8672-4939-95E8-AEE242A4EB6E", "versionEndIncluding": "1.0.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*", "matchCriteriaId": "8620DFD9-E280-464E-91FF-2E901EDD49C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv180_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66B8EC15-EC05-49DD-9334-AEE5C396FEC1", "versionEndIncluding": "1.0.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv180:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8BD67F3-98CE-4B03-8980-6791B753FDC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5E3FBF6-4EB3-4C2F-AE0E-25F5765DD107", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The network-diagnostics administration interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote authenticated users to execute arbitrary commands via a crafted HTTP request, aka Bug ID CSCuh87126." }, { "lang": "es", "value": "La interfaz de administraci\u00f3n de la diagnostica de la red en el firmware del router Cisco RV en los dispositivos RV220W, anterior a 1.0.5.9 en los dispositivos RV120W, y anterior a 1.0.4.14 en los dispositivos RV180 y RV180W permite a usuarios remotos autenticados ejecutar comandos arbitrarios a trav\u00e9s de una solicitud HTTP manipulada, tambi\u00e9n conocido como Bug ID CSCuh87126." } ], "id": "CVE-2014-2177", "lastModified": "2024-11-21T02:05:47.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-07T11:55:02.407", "references": [ { "source": "ykramarz@cisco.com", "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "source": "ykramarz@cisco.com", "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1031171" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98497" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | rv180_firmware | * | |
cisco | rv180 | - | |
cisco | rv180w | - | |
cisco | rv220w_firmware | * | |
cisco | rv220w | - | |
cisco | rv120w_firmware | * | |
cisco | rv120w | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv180_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66B8EC15-EC05-49DD-9334-AEE5C396FEC1", "versionEndIncluding": "1.0.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv180:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8BD67F3-98CE-4B03-8980-6791B753FDC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5E3FBF6-4EB3-4C2F-AE0E-25F5765DD107", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv220w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5EB99F-8672-4939-95E8-AEE242A4EB6E", "versionEndIncluding": "1.0.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*", "matchCriteriaId": "8620DFD9-E280-464E-91FF-2E901EDD49C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv120w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAE232F2-B674-40E7-A96D-A1AC07CB84B7", "versionEndIncluding": "1.0.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv120w:-:*:*:*:*:*:*:*", "matchCriteriaId": "40465CA8-BE8B-4F15-8578-D8972C241D84", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the administrative web interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to hijack the authentication of administrators, aka Bug ID CSCuh87145." }, { "lang": "es", "value": "Vulnerabilidad de CSRF en la interfaz web administrativa en el firmware del router Cisco RV en los dispositivos RV220W , anterior a 1.0.5.9 en los dispositivos RV120W, y anterior a 1.0.4.14 en los dispositivos RV180 y RV180W permite a atacantes remotos secuestrar la autenticaci\u00f3n de administradores, tambi\u00e9n conocido como Bug ID CSCuh87145." } ], "id": "CVE-2014-2178", "lastModified": "2024-11-21T02:05:48.050", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-11-07T11:55:02.487", "references": [ { "source": "ykramarz@cisco.com", "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "source": "ykramarz@cisco.com", "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1031171" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98498" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98498" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - | |
cisco | rvs4000_firmware | * | |
cisco | rvs4000 | - | |
cisco | wrv210_firmware | * | |
cisco | wrv210 | - | |
cisco | wap4410n_firmware | * | |
cisco | wap4410n | - | |
cisco | wrv200_firmware | 1.0.39 | |
cisco | wrv200 | - | |
cisco | wrvs4400n_firmware | * | |
cisco | wrvs4400n | - | |
cisco | wap200_firmware | * | |
cisco | wap200 | - | |
cisco | wvc2300_firmware | * | |
cisco | wvc2300 | - | |
cisco | pvc2300_firmware | * | |
cisco | pvc2300 | - | |
cisco | srw224p_firmware | * | |
cisco | srw224p | - | |
cisco | wet200_firmware | * | |
cisco | wet200 | - | |
cisco | wap2000_firmware | * | |
cisco | wap2000 | - | |
cisco | wap4400n_firmware | * | |
cisco | wap4400n | - | |
cisco | rv120w_firmware | * | |
cisco | rv120w | - | |
cisco | rv180_firmware | * | |
cisco | rv180 | - | |
cisco | rv180w_firmware | * | |
cisco | rv180w | - | |
cisco | rv315w_firmware | * | |
cisco | rv315w | - | |
cisco | srp520_firmware | * | |
cisco | srp520 | - | |
cisco | srp520-u_firmware | * | |
cisco | srp520-u | - | |
cisco | wrp500_firmware | * | |
cisco | wrp500 | - | |
cisco | spa400_firmware | * | |
cisco | spa400 | - | |
cisco | rtp300_firmware | * | |
cisco | rtp300 | - | |
cisco | rv220w_firmware | * | |
cisco | rv220w | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F503CBF1-C2FB-40ED-8DA4-85F233EC4F8F", "versionEndIncluding": "1.3.1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE1BC6E1-8A83-438F-AE33-3AAED7DF1CBE", "versionEndIncluding": "1.3.1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rvs4000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7881E4BC-6590-49C0-88C4-A21F2BE2B4FE", "versionEndIncluding": "2.0.3.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rvs4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC30BCF7-FA1A-44B3-8C58-17DFA939E7C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wrv210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E9D1511-2B20-4013-9504-0FE9A9B5220C", "versionEndIncluding": "2.0.1.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wrv210:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FA20862-B235-4230-8861-A59CF62CC65E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wap4410n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB758D90-1888-42E3-9305-82F59D9C1891", "versionEndIncluding": "2.0.7.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wap4410n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFF89AC2-2A85-463C-A644-B3FA31A470FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wrv200_firmware:1.0.39:*:*:*:*:*:*:*", "matchCriteriaId": "57B0AF22-058C-4273-8A3F-744692DFB77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wrv200:-:*:*:*:*:*:*:*", "matchCriteriaId": "F73575BC-B0E8-49A5-8E68-4D9B3109029D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wrvs4400n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1D37CC-A650-496D-B66B-62F69EFFFCCC", "versionEndIncluding": "2.0.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wrvs4400n:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC842A29-7A55-4474-B5AD-A6813FE16A7D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wap200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBC035F1-83DE-47F1-BF2D-72FE32E926BC", "versionEndIncluding": "2.0.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wap200:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD50A4C8-8E79-4D0B-8D23-88425EFE9234", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wvc2300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6F6D758-4D48-4D16-B54C-08F924D8623C", "versionEndIncluding": "1.1.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wvc2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1122B4F-87D0-4030-9C4C-E811BBEAC51F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:pvc2300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24B3D0D5-BA35-44A7-A9AC-EFC38638424E", "versionEndIncluding": "1.1.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:pvc2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B259F8-E3F8-44D0-9EDB-BC686F239CF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:srw224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72473F9C-4AD6-47AE-9568-D7451EB8DD09", "versionEndIncluding": "2.0.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:srw224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B559090-2CB3-41E6-B9C8-EB83FC7AFE54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wet200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1B80159-909F-4B59-9DC6-34C1E508FCD1", "versionEndIncluding": "2.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wet200:-:*:*:*:*:*:*:*", "matchCriteriaId": "565A92B8-DF55-4F7D-B312-E1870728F27A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wap2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3751819E-FF92-4540-93D2-2D8F8427D826", "versionEndIncluding": "2.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wap2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4844B66-4D3A-4526-87A3-6C45B9360691", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wap4400n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C17056F7-933C-45AD-8F75-64E4B9ADFB55", "versionEndIncluding": "-", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wap4400n:-:*:*:*:*:*:*:*", "matchCriteriaId": "D47B755E-277A-4FF5-B005-C7F28B191D6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv120w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34E8DF08-06D6-46EE-AE4A-8FA11D3E1FB9", "versionEndIncluding": "1.0.5.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv120w:-:*:*:*:*:*:*:*", "matchCriteriaId": "40465CA8-BE8B-4F15-8578-D8972C241D84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv180_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A27C46AD-51E7-463F-A296-D4C6DF9B01F7", "versionEndIncluding": "1.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv180:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8BD67F3-98CE-4B03-8980-6791B753FDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv180w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA690405-6AB8-4503-90AB-0B25F50F4776", "versionEndIncluding": "1.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5E3FBF6-4EB3-4C2F-AE0E-25F5765DD107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv315w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EEDA17A-529D-455C-B608-DFCFEC4DD448", "versionEndIncluding": "1.01.03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv315w:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D7B47D7-4D6B-43BF-BF1C-E89C781DDD14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:srp520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "857DB576-9674-42E1-B122-0ACCD696818F", "versionEndIncluding": "1.01.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:srp520:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEE62C2A-30E6-4E0F-AC84-1A75F5032D22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:srp520-u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F87C7EB8-4AF8-484E-B90F-B5E2C77D7679", "versionEndIncluding": "1.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:srp520-u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4A12DCA-F804-4CC1-B1FE-EF4A182A9722", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wrp500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67487247-39A1-4EF9-A451-3A2585CC7D54", "versionEndIncluding": "1.0.1.002", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wrp500:-:*:*:*:*:*:*:*", "matchCriteriaId": "78DAF22A-9A5A-4E55-AF0F-ED9969610411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26067A0B-6752-4008-A021-57A76AC84F26", "versionEndIncluding": "1.1.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A20F9B77-999F-4B2E-8894-6D6AED4A92CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rtp300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "114E7DD2-5C5F-40A2-A795-FF75FACB4567", "versionEndIncluding": "3.1.24", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rtp300:-:*:*:*:*:*:*:*", "matchCriteriaId": "78E72C11-E53D-4E29-802A-002F0229C158", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv220w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9C4E5A6-88BB-4758-8222-369BAE95C14B", "versionEndIncluding": "1.0.4.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*", "matchCriteriaId": "8620DFD9-E280-464E-91FF-2E901EDD49C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913." }, { "lang": "es", "value": "M\u00faltiples dispositivos con software de Cisco incorporado utilizan certificados X.509 embebidos y claves de host SSH embebidas en el firmware, lo que permite que atacantes remotos superen los mecanismos de protecci\u00f3n criptogr\u00e1fica y realicen ataques Man-in-the-Middle (MitM) sabiendo de estos certificados y claves de otra instalaci\u00f3n. Esto tambi\u00e9n se conoce por los siguientes Bug ID: CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899 y CSCuw90913." } ], "id": "CVE-2015-6358", "lastModified": "2024-11-21T02:34:50.923", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-12T15:29:00.217", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/566724" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/78047" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034255" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034256" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034257" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/566724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/78047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034255" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034258" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | rv180_firmware | * | |
cisco | rv180 | - | |
cisco | rv180w | - | |
cisco | rv120w_firmware | * | |
cisco | rv120w | - | |
cisco | rv220w_firmware | * | |
cisco | rv220w | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv180_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66B8EC15-EC05-49DD-9334-AEE5C396FEC1", "versionEndIncluding": "1.0.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv180:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8BD67F3-98CE-4B03-8980-6791B753FDC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5E3FBF6-4EB3-4C2F-AE0E-25F5765DD107", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv120w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAE232F2-B674-40E7-A96D-A1AC07CB84B7", "versionEndIncluding": "1.0.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv120w:-:*:*:*:*:*:*:*", "matchCriteriaId": "40465CA8-BE8B-4F15-8578-D8972C241D84", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv220w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5EB99F-8672-4939-95E8-AEE242A4EB6E", "versionEndIncluding": "1.0.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*", "matchCriteriaId": "8620DFD9-E280-464E-91FF-2E901EDD49C0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to upload files to arbitrary locations via a crafted HTTP request, aka Bug ID CSCuh86998." }, { "lang": "es", "value": "El firmware del router Cisco RV en los dispositivos RV220W, anterior a 1.0.5.9 en los dispositivos RV120W, y anterior a 1.0.4.14 en los dispositivos RV180 y RV180W permite a atacantes remotos subir ficheros a localizaciones arbitrarias a trav\u00e9s de una solicitud HTTP manipulada, tambi\u00e9n conocido como Bug ID CSCuh86998." } ], "id": "CVE-2014-2179", "lastModified": "2024-11-21T02:05:48.177", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-07T11:55:02.517", "references": [ { "source": "ykramarz@cisco.com", "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "source": "ykramarz@cisco.com", "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "source": "ykramarz@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1031171" }, { "source": "ykramarz@cisco.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98499" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98499" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201710-0035
Vulnerability from variot
Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehböck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. The Cisco RV320 Dual Gigabit WAN VPN is a router product from Cisco Systems, USA. Multiple Cisco Products are prone to an information-disclosure vulnerability. Successful exploits will lead to other attacks. This issue is being tracked by Cisco Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. The flaw stems from the fact that the program does not generate unique keys and certificates
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0035", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wap4410n", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.7.8" }, { "model": "srp520-u", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.2.6" }, { "model": "wap2000", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.8.0" }, { "model": "wvc2300", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.1.2.6" }, { "model": "rv315w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.01.03" }, { "model": "wap4400n", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "srp520", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.01.29" }, { "model": "rtp300", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "3.1.24" }, { "model": "rv180w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.5.4" }, { "model": "wrvs4400n", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.2.2" }, { "model": "wap200", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.6.0" }, { "model": "rvs4000", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.3.4" }, { "model": "wrv210", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.1.5" }, { "model": "wrp500", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.1.002" }, { "model": "rv325", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.10" }, { "model": "wrv200", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0.39" }, { "model": "rv180", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.5.4" }, { "model": "wet200", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.8.0" }, { "model": "rv120w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.5.9" }, { "model": "spa400", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.1.2.2" }, { "model": "pvc2300", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.1.2.6" }, { "model": "srw224p", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0.2.4" }, { "model": "rv220w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.4.17" }, { "model": "rv320", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.3.1.10" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "actiontec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "general electric", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netcomm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sierra", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "technicolor", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubiquiti", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "unify", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zte", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "c1000z", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "fr1000z", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-24", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "gs1900-8", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1100-n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1100-nh", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1121-ni", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ac", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "nwa1123-ni", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-660hn-51", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p-663hn-51", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "p8702n", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "pmg5318-b20a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "q1000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3300-n000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3300-nb00", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "sbg3500-n000", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg1312-b30b", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg4380-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8324-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b10a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vmg8924-b30a", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "vsg1435-b101", "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": "", "scope": null, "trust": 0.8, "vendor": "multiple vendors", "version": null }, { "model": "rv320 dual gigabit wan vpn router", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv325 dual gigabit wan vpn router", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rv325 dual wan gigabit vpn router", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rvs4000 4-port gigabit security router vpn", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "wrv210 wireless-g vpn router rangebooster", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "wap4410n wireless-n access point poe/advanced security", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "wrv200 wireless-g vpn router rangebooster", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "wrvs4400n wireless", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "srw224p", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.0.2.4" }, { "model": "wap4400n", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "wvc2300", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.1.2.6" }, { "model": "rv180", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.5.4" }, { "model": "wap200", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.0.6.0" }, { "model": "wrvs4400n", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.0.2.2" }, { "model": "rv180w", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.5.4" }, { "model": "wap2000", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.0.8.0" }, { "model": "pvc2300", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.1.2.6" }, { "model": "wet200", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "2.0.8.0" }, { "model": "wvc2300 wireless-g business internet video camera audio", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "wrvs4400n wireless-n gigabit security router vpn", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-2.0" }, { "model": "wrv210 wireless-g vpn router rangebooster", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "wrv200 wireless-g vpn router rangebooster", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "wrp500 wireless-ac broadband router with phone ports", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20" }, { "model": "wet200 wireless-g business ethernet bridge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "wap4410n wireless-n access point poe/advanced security", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "wap4400n wireless-n access point poe", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "wap2000 wireless-g access point poe", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "wap200 wireless-g access point poe/rangebooster", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "srw224p 24-port 2-port gigabit switch webview/poe", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10/100+-0" }, { "model": "spa400 internet telephony gateway with fxo ports", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40" }, { "model": "small business srp520-u models", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "small business srp520 models", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rvs4000 4-port gigabit security router vpn", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "rv325 dual wan gigabit vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv325 dual gigabit wan vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv320 dual gigabit wan vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv315w wireless-n vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv220w wireless network security firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv180w wireless-n multifunction vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv180 vpn router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rv120w wireless-n vpn firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "rtp300 broadband router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "pvc2300 business internet video camera audio/poe", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "BID", "id": "78047" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-6358" }, { "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.3.1.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.3.1.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rvs4000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.3.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rvs4000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wrv210_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.1.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wrv210:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wap4410n_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.7.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wap4410n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wrv200_firmware:1.0.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wrv200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wrvs4400n_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.2.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wrvs4400n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wap200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.6.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wap200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wvc2300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.1.2.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wvc2300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:pvc2300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.1.2.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:pvc2300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:srw224p_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.2.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:srw224p:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wet200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.8.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wet200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wap2000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.8.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wap2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wap4400n_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "-", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wap4400n:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv120w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.5.9", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv120w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv180_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.5.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv180:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv180w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.5.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv315w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.01.03", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv315w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:srp520_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.01.29", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:srp520:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:srp520-u_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.2.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:srp520-u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wrp500_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.1.002", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:wrp500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:spa400_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.1.2.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:spa400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rtp300_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.1.24", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rtp300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv220w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.4.17", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-6358" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stefan Viehb\u00f6ck of SEC Consult.", "sources": [ { "db": "BID", "id": "78047" } ], "trust": 0.3 }, "cve": "CVE-2015-6358", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-6358", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2015-07863", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-84319", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-6358", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-07863", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201511-426", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-84319", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "VULHUB", "id": "VHN-84319" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-6358" }, { "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. The encryption key is hard-coded (CWE-321) SEC Consult of Stefan Viehb\u0026#246;ck According to the survey, many embedded devices are not unique X.509 Certificate and SSH It is said that it is accessible from the Internet using a host key. A hard-coded key in a firmware image or a repository stored by scanning the Internet scans.io ( In particular SSH And the result of SSL Certificate ) A device that uses a certificate whose fingerprint matches the data of can be determined to be vulnerable. Affected devices include household routers and IP From the camera VoIP Wide range of products. CWE-321: Use of Hard-coded Cryptographic Key http://cwe.mitre.org/data/definitions/321.html scans.io https://scans.io/ SSH Result of https://scans.io/series/ssh-rsa-full-ipv4 SSL Certificate https://scans.io/study/sonar.ssl In many vulnerable devices, certificate and key reuse is limited to a limited product line by a specific developer, but there are several examples where multiple developers use the same certificate or key. Or exist. These are common SDK Firmware developed using, or ISP Provided by OEM The root cause is the use of device firmware. Vulnerable equipment is impersonation and intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. Perhaps the attacker can obtain authentication information and other sensitive information and use it for further attacks. Survey results and certificates SSH For more information on systems affected by host key issues, see SEC Consult See the blog post. Certificate https://www.sec-consult.com/download/certificates.html SSH Host key https://www.sec-consult.com/download/ssh_host_keys.html SEC Consult http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.htmlA remote attacker impersonates a user or intermediary (man-in-the-middle) There is a possibility of being attacked or deciphering the communication contents. As a result, confidential information may be leaked. The Cisco RV320 Dual Gigabit WAN VPN is a router product from Cisco Systems, USA. Multiple Cisco Products are prone to an information-disclosure vulnerability. Successful exploits will lead to other attacks. \nThis issue is being tracked by Cisco Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. The flaw stems from the fact that the program does not generate unique keys and certificates", "sources": [ { "db": "NVD", "id": "CVE-2015-6358" }, { "db": "CERT/CC", "id": "VU#566724" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "BID", "id": "78047" }, { "db": "VULHUB", "id": "VHN-84319" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#566724", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2015-6358", "trust": 3.4 }, { "db": "BID", "id": "78047", "trust": 2.0 }, { "db": "SECTRACK", "id": "1034257", "trust": 1.7 }, { "db": "SECTRACK", "id": "1034255", "trust": 1.7 }, { "db": "SECTRACK", "id": "1034258", "trust": 1.7 }, { "db": "SECTRACK", "id": "1034256", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU96100360", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006907", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-426", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-07863", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-84319", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "VULHUB", "id": "VHN-84319" }, { "db": "BID", "id": "78047" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-6358" }, { "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "id": "VAR-201710-0035", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "VULHUB", "id": "VHN-84319" } ], "trust": 1.3657509969230768 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07863" } ] }, "last_update_date": "2023-12-18T12:57:18.166000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Zyxel to Fix SSH Private Key and Certificate Vulnerability (CVE-2015-7256)", "trust": 0.8, "url": "http://www.zyxel.com/support/announcement_ssh_private_key_and_certificate_vulnerability.shtml" }, { "title": "Patches for multiple Cisco product information disclosure vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/67387" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-295", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84319" }, { "db": "NVD", "id": "CVE-2015-6358" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.kb.cert.org/vuls/id/566724" }, { "trust": 2.6, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151125-ci" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/78047" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1034255" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1034256" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1034257" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1034258" }, { "trust": 1.6, "url": "http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html" }, { "trust": 0.8, "url": "http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html" }, { "trust": 0.8, "url": "https://www.sec-consult.com/download/certificates.html" }, { "trust": 0.8, "url": "https://www.sec-consult.com/download/ssh_host_keys.html" }, { "trust": 0.8, "url": "https://scans.io/" }, { "trust": 0.8, "url": "https://scans.io/series/ssh-rsa-full-ipv4" }, { "trust": 0.8, "url": "https://scans.io/study/sonar.ssl" }, { "trust": 0.8, "url": "https://censys.io" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6358" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7255" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7256" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7276" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8251" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96100360/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7256" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6358" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7255" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7276" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8251" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/bluu-a2nqxj" } ], "sources": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "VULHUB", "id": "VHN-84319" }, { "db": "BID", "id": "78047" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-6358" }, { "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#566724" }, { "db": "CNVD", "id": "CNVD-2015-07863" }, { "db": "VULHUB", "id": "VHN-84319" }, { "db": "BID", "id": "78047" }, { "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "db": "NVD", "id": "CVE-2015-6358" }, { "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-25T00:00:00", "db": "CERT/CC", "id": "VU#566724" }, { "date": "2015-12-01T00:00:00", "db": "CNVD", "id": "CNVD-2015-07863" }, { "date": "2017-10-12T00:00:00", "db": "VULHUB", "id": "VHN-84319" }, { "date": "2015-11-25T00:00:00", "db": "BID", "id": "78047" }, { "date": "2016-02-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "date": "2017-10-12T15:29:00.217000", "db": "NVD", "id": "CVE-2015-6358" }, { "date": "2015-11-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-06T00:00:00", "db": "CERT/CC", "id": "VU#566724" }, { "date": "2015-12-01T00:00:00", "db": "CNVD", "id": "CNVD-2015-07863" }, { "date": "2017-11-03T00:00:00", "db": "VULHUB", "id": "VHN-84319" }, { "date": "2015-11-25T00:00:00", "db": "BID", "id": "78047" }, { "date": "2018-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006907" }, { "date": "2017-11-03T16:46:26.840000", "db": "NVD", "id": "CVE-2015-6358" }, { "date": "2017-10-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-426" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-426" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedded devices use non-unique X.509 certificates and SSH host keys", "sources": [ { "db": "CERT/CC", "id": "VU#566724" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-426" } ], "trust": 0.6 } }
var-201411-0400
Vulnerability from variot
The network-diagnostics administration interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote authenticated users to execute arbitrary commands via a crafted HTTP request, aka Bug ID CSCuh87126. The Cisco RV router firmware is the Cisco RV 180 Series VPN Router firmware. An attacker could exploit this vulnerability to execute arbitrary code. Multiple Cisco RV Series Routers are prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. Successfully exploiting this issue may allow an attacker to execute arbitrary commands with root privileges in the context of the affected device. This issue is being tracked by Cisco Bug ID CSCuh87126. Cisco RV120W Wireless-N VPN Firewall, etc. are all products of Cisco (Cisco).
Details
https://www.securify.nl/advisory/SFY20130601/cisco_rv_series_multiple_vulnerabilities.html
References
[1] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2177 [2] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2178 [3] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2179 [4] http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201411-0400", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rv220w wireless network security firewall", "scope": null, "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "rv120w", "scope": "eq", "trust": 1.2, "vendor": "cisco", "version": "1.0.5.8" }, { "model": "rv180", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.10" }, { "model": "rv220w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.5.8" }, { "model": "rv120w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "rv180w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "rv180", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "rv220w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "rv120w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.5.8" }, { "model": "rv120w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv120w wireless-n vpn firewall", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "1.0.5.9" }, { "model": "rv180 vpn router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv180 vpn router", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "1.0.4.14" }, { "model": "rv180w wireless-n multifunction vpn router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv180", "scope": "lte", "trust": 0.6, "vendor": "cisco", "version": "\u003c=1.0.3.10" }, { "model": "rv220w", "scope": "lte", "trust": 0.6, "vendor": "cisco", "version": "\u003c=1.0.5.8" }, { "model": "rv220w", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.5.8" }, { "model": "rv180", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.3.10" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08188" }, { "db": "JVNDB", "id": "JVNDB-2014-005294" }, { "db": "NVD", "id": "CVE-2014-2177" }, { "db": "CNNVD", "id": "CNNVD-201411-099" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv120w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.5.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv120w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv220w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.5.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv180_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.3.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:rv180:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-2177" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Yorick Koster of Securify.", "sources": [ { "db": "BID", "id": "70921" } ], "trust": 0.3 }, "cve": "CVE-2014-2177", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2014-2177", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.8, "id": "CNVD-2014-08188", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-70116", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-2177", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2014-08188", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201411-099", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-70116", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08188" }, { "db": "VULHUB", "id": "VHN-70116" }, { "db": "JVNDB", "id": "JVNDB-2014-005294" }, { "db": "NVD", "id": "CVE-2014-2177" }, { "db": "CNNVD", "id": "CNNVD-201411-099" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The network-diagnostics administration interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote authenticated users to execute arbitrary commands via a crafted HTTP request, aka Bug ID CSCuh87126. The Cisco RV router firmware is the Cisco RV 180 Series VPN Router firmware. An attacker could exploit this vulnerability to execute arbitrary code. Multiple Cisco RV Series Routers are prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. \nSuccessfully exploiting this issue may allow an attacker to execute arbitrary commands with root privileges in the context of the affected device. \nThis issue is being tracked by Cisco Bug ID CSCuh87126. Cisco RV120W Wireless-N VPN Firewall, etc. are all products of Cisco (Cisco). \n\n------------------------------------------------------------------------\nDetails\n------------------------------------------------------------------------\nhttps://www.securify.nl/advisory/SFY20130601/cisco_rv_series_multiple_vulnerabilities.html\n\n------------------------------------------------------------------------\nReferences\n------------------------------------------------------------------------\n[1] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2177\n[2] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2178\n[3] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2179\n[4]\nhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv \n", "sources": [ { "db": "NVD", "id": "CVE-2014-2177" }, { "db": "JVNDB", "id": "JVNDB-2014-005294" }, { "db": "CNVD", "id": "CNVD-2014-08188" }, { "db": "BID", "id": "70921" }, { "db": "VULHUB", "id": "VHN-70116" }, { "db": "PACKETSTORM", "id": "128992" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2177", "trust": 3.5 }, { "db": "PACKETSTORM", "id": "128992", "trust": 1.2 }, { "db": "SECTRACK", "id": "1031171", "trust": 1.1 }, { "db": "BID", "id": "70921", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2014-005294", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201411-099", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-08188", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-70116", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08188" }, { "db": "VULHUB", "id": "VHN-70116" }, { "db": "BID", "id": "70921" }, { "db": "JVNDB", "id": "JVNDB-2014-005294" }, { "db": "PACKETSTORM", "id": "128992" }, { "db": "NVD", "id": "CVE-2014-2177" }, { "db": "CNNVD", "id": "CNNVD-201411-099" } ] }, "id": "VAR-201411-0400", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-08188" }, { "db": "VULHUB", "id": "VHN-70116" } ], "trust": 1.32253884 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08188" } ] }, "last_update_date": "2023-12-18T12:21:07.771000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20141105-rv", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20141105-rv" }, { "title": "36240", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=36240" }, { "title": "Cisco RV router firmware patch for arbitrary code execution vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/51777" }, { "title": "RV120W-Firmware-1.0.5.9", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54615" }, { "title": "RV180W-Firmware-1.0.4.14", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54617" }, { "title": "RV180-Firmware-1.0.4.14", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54616" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08188" }, { "db": "JVNDB", "id": "JVNDB-2014-005294" }, { "db": "CNNVD", "id": "CNNVD-201411-099" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-70116" }, { "db": "JVNDB", "id": "JVNDB-2014-005294" }, { "db": "NVD", "id": "CVE-2014-2177" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20141105-rv" }, { "trust": 1.5, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2177" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "trust": 1.1, "url": "http://seclists.org/fulldisclosure/2014/nov/6" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/128992/cisco-rv-overwrite-csrf-command-execution.html" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1031171" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98497" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2177" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/70921/" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2177" }, { "trust": 0.1, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2179" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2179" }, { "trust": 0.1, "url": "https://www.securify.nl/advisory/sfy20130601/cisco_rv_series_multiple_vulnerabilities.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2178" }, { "trust": 0.1, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2178" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08188" }, { "db": "VULHUB", "id": "VHN-70116" }, { "db": "BID", "id": "70921" }, { "db": "JVNDB", "id": "JVNDB-2014-005294" }, { "db": "PACKETSTORM", "id": "128992" }, { "db": "NVD", "id": "CVE-2014-2177" }, { "db": "CNNVD", "id": "CNNVD-201411-099" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-08188" }, { "db": "VULHUB", "id": "VHN-70116" }, { "db": "BID", "id": "70921" }, { "db": "JVNDB", "id": "JVNDB-2014-005294" }, { "db": "PACKETSTORM", "id": "128992" }, { "db": "NVD", "id": "CVE-2014-2177" }, { "db": "CNNVD", "id": "CNNVD-201411-099" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-11-11T00:00:00", "db": "CNVD", "id": "CNVD-2014-08188" }, { "date": "2014-11-07T00:00:00", "db": "VULHUB", "id": "VHN-70116" }, { "date": "2014-11-05T00:00:00", "db": "BID", "id": "70921" }, { "date": "2014-11-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005294" }, { "date": "2014-11-06T12:02:22", "db": "PACKETSTORM", "id": "128992" }, { "date": "2014-11-07T11:55:02.407000", "db": "NVD", "id": "CVE-2014-2177" }, { "date": "2014-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-099" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-11-11T00:00:00", "db": "CNVD", "id": "CNVD-2014-08188" }, { "date": "2018-10-09T00:00:00", "db": "VULHUB", "id": "VHN-70116" }, { "date": "2014-11-24T00:58:00", "db": "BID", "id": "70921" }, { "date": "2014-11-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005294" }, { "date": "2018-10-09T19:43:09.423000", "db": "NVD", "id": "CVE-2014-2177" }, { "date": "2014-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-099" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-099" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco RV Router Firmware network-diagnostics An arbitrary command execution vulnerability in the management interface", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005294" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-099" } ], "trust": 0.6 } }
var-201411-0401
Vulnerability from variot
Cross-site request forgery (CSRF) vulnerability in the administrative web interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to hijack the authentication of administrators, aka Bug ID CSCuh87145. Vendors have confirmed this vulnerability Bug ID CSCuh87145 It is released as.A third party could hijack the administrator's authentication. The Cisco RV router firmware is the Cisco RV180 Series VPN Router firmware. An attacker could exploit this vulnerability to hijack an administrator's authentication information. Exploiting this issue may allow a remote attacker to perform certain actions in the context of an authorized user's session and gain unauthorized access to the affected device. This issue is being tracked by Cisco Bug IDs CSCuh87145. are all products of Cisco (Cisco).
Details
https://www.securify.nl/advisory/SFY20130601/cisco_rv_series_multiple_vulnerabilities.html
References
[1] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2177 [2] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2178 [3] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2179 [4] http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201411-0401", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rv220w wireless network security firewall", "scope": null, "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "rv120w", "scope": "eq", "trust": 1.2, "vendor": "cisco", "version": "1.0.5.8" }, { "model": "rv180", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.10" }, { "model": "rv220w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "rv220w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.5.8" }, { "model": "rv120w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "rv180w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "rv180", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "rv120w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.5.8" }, { "model": "rv120w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv120w wireless-n vpn firewall", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "1.0.5.9" }, { "model": "rv180 vpn router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv180 vpn router", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "1.0.4.14" }, { "model": "rv180w wireless-n multifunction vpn router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv180", "scope": "lte", "trust": 0.6, "vendor": "cisco", "version": "\u003c=1.0.3.10" }, { "model": "rv220w", "scope": "lte", "trust": 0.6, "vendor": "cisco", "version": "\u003c=1.0.5.8" }, { "model": "rv220w", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.5.8" }, { "model": "rv180", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.3.10" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08200" }, { "db": "JVNDB", "id": "JVNDB-2014-005295" }, { "db": "NVD", "id": "CVE-2014-2178" }, { "db": "CNNVD", "id": "CNNVD-201411-100" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv180_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.3.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:rv180:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv220w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.5.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv120w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.5.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv120w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-2178" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Yorick Koster of Securify.", "sources": [ { "db": "BID", "id": "70922" } ], "trust": 0.3 }, "cve": "CVE-2014-2178", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-2178", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2014-08200", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-70117", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-2178", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2014-08200", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201411-100", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-70117", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08200" }, { "db": "VULHUB", "id": "VHN-70117" }, { "db": "JVNDB", "id": "JVNDB-2014-005295" }, { "db": "NVD", "id": "CVE-2014-2178" }, { "db": "CNNVD", "id": "CNNVD-201411-100" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site request forgery (CSRF) vulnerability in the administrative web interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to hijack the authentication of administrators, aka Bug ID CSCuh87145. Vendors have confirmed this vulnerability Bug ID CSCuh87145 It is released as.A third party could hijack the administrator\u0027s authentication. The Cisco RV router firmware is the Cisco RV180 Series VPN Router firmware. An attacker could exploit this vulnerability to hijack an administrator\u0027s authentication information. \nExploiting this issue may allow a remote attacker to perform certain actions in the context of an authorized user\u0027s session and gain unauthorized access to the affected device. \nThis issue is being tracked by Cisco Bug IDs CSCuh87145. are all products of Cisco (Cisco). \n\n------------------------------------------------------------------------\nDetails\n------------------------------------------------------------------------\nhttps://www.securify.nl/advisory/SFY20130601/cisco_rv_series_multiple_vulnerabilities.html\n\n------------------------------------------------------------------------\nReferences\n------------------------------------------------------------------------\n[1] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2177\n[2] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2178\n[3] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2179\n[4]\nhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv \n", "sources": [ { "db": "NVD", "id": "CVE-2014-2178" }, { "db": "JVNDB", "id": "JVNDB-2014-005295" }, { "db": "CNVD", "id": "CNVD-2014-08200" }, { "db": "BID", "id": "70922" }, { "db": "VULHUB", "id": "VHN-70117" }, { "db": "PACKETSTORM", "id": "128992" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2178", "trust": 3.5 }, { "db": "PACKETSTORM", "id": "128992", "trust": 1.2 }, { "db": "SECTRACK", "id": "1031171", "trust": 1.1 }, { "db": "BID", "id": "70922", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2014-005295", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201411-100", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-08200", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-70117", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08200" }, { "db": "VULHUB", "id": "VHN-70117" }, { "db": "BID", "id": "70922" }, { "db": "JVNDB", "id": "JVNDB-2014-005295" }, { "db": "PACKETSTORM", "id": "128992" }, { "db": "NVD", "id": "CVE-2014-2178" }, { "db": "CNNVD", "id": "CNNVD-201411-100" } ] }, "id": "VAR-201411-0401", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-08200" }, { "db": "VULHUB", "id": "VHN-70117" } ], "trust": 1.32253884 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08200" } ] }, "last_update_date": "2023-12-18T12:21:07.735000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20141105-rv", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20141105-rv" }, { "title": "36241", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=36241" }, { "title": "Patch for Cisco RV router firmware cross-site request forgery vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/51779" }, { "title": "RV120W-Firmware-1.0.5.9", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54615" }, { "title": "RV180W-Firmware-1.0.4.14", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54617" }, { "title": "RV180-Firmware-1.0.4.14", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54616" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08200" }, { "db": "JVNDB", "id": "JVNDB-2014-005295" }, { "db": "CNNVD", "id": "CNNVD-201411-100" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-70117" }, { "db": "JVNDB", "id": "JVNDB-2014-005295" }, { "db": "NVD", "id": "CVE-2014-2178" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20141105-rv" }, { "trust": 1.5, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2178" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "trust": 1.1, "url": "http://seclists.org/fulldisclosure/2014/nov/6" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/128992/cisco-rv-overwrite-csrf-command-execution.html" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1031171" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98498" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2178" }, { "trust": 0.3, "url": "http://www.cisco.com" }, { "trust": 0.1, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2177" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2177" }, { "trust": 0.1, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2179" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2179" }, { "trust": 0.1, "url": "https://www.securify.nl/advisory/sfy20130601/cisco_rv_series_multiple_vulnerabilities.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2178" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08200" }, { "db": "VULHUB", "id": "VHN-70117" }, { "db": "BID", "id": "70922" }, { "db": "JVNDB", "id": "JVNDB-2014-005295" }, { "db": "PACKETSTORM", "id": "128992" }, { "db": "NVD", "id": "CVE-2014-2178" }, { "db": "CNNVD", "id": "CNNVD-201411-100" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-08200" }, { "db": "VULHUB", "id": "VHN-70117" }, { "db": "BID", "id": "70922" }, { "db": "JVNDB", "id": "JVNDB-2014-005295" }, { "db": "PACKETSTORM", "id": "128992" }, { "db": "NVD", "id": "CVE-2014-2178" }, { "db": "CNNVD", "id": "CNNVD-201411-100" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-11-12T00:00:00", "db": "CNVD", "id": "CNVD-2014-08200" }, { "date": "2014-11-07T00:00:00", "db": "VULHUB", "id": "VHN-70117" }, { "date": "2014-11-05T00:00:00", "db": "BID", "id": "70922" }, { "date": "2014-11-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005295" }, { "date": "2014-11-06T12:02:22", "db": "PACKETSTORM", "id": "128992" }, { "date": "2014-11-07T11:55:02.487000", "db": "NVD", "id": "CVE-2014-2178" }, { "date": "2014-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-100" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-11-12T00:00:00", "db": "CNVD", "id": "CNVD-2014-08200" }, { "date": "2018-10-09T00:00:00", "db": "VULHUB", "id": "VHN-70117" }, { "date": "2014-11-24T02:58:00", "db": "BID", "id": "70922" }, { "date": "2015-12-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005295" }, { "date": "2018-10-09T19:43:10.127000", "db": "NVD", "id": "CVE-2014-2178" }, { "date": "2014-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-100" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-100" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco RV Router Firmware management Web Cross-site request forgery vulnerability in the interface", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005295" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-100" } ], "trust": 0.6 } }
var-201411-0402
Vulnerability from variot
The Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to upload files to arbitrary locations via a crafted HTTP request, aka Bug ID CSCuh86998. Vendors have confirmed this vulnerability Bug ID CSCuh86998 It is released as.Skillfully crafted by a third party HTTP A file may be uploaded to any location via a request. An attacker could exploit this vulnerability to upload arbitrary files. This issue is being tracked by Cisco Bug ID CSCuh86998. are all products of Cisco (Cisco).
Details
https://www.securify.nl/advisory/SFY20130601/cisco_rv_series_multiple_vulnerabilities.html
References
[1] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2177 [2] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2178 [3] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2179 [4] http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201411-0402", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rv220w wireless network security firewall", "scope": null, "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "rv120w", "scope": "eq", "trust": 1.2, "vendor": "cisco", "version": "1.0.5.8" }, { "model": "rv180", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.3.10" }, { "model": "rv220w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "rv220w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.5.8" }, { "model": "rv120w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "rv180w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "rv180", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "rv120w", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "1.0.5.8" }, { "model": "rv120w wireless-n vpn firewall", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv120w wireless-n vpn firewall", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "1.0.5.9" }, { "model": "rv180 vpn router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv180 vpn router", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "1.0.4.14" }, { "model": "rv180w wireless-n multifunction vpn router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "rv180", "scope": "lte", "trust": 0.6, "vendor": "cisco", "version": "\u003c=1.0.3.10" }, { "model": "rv220w", "scope": "lte", "trust": 0.6, "vendor": "cisco", "version": "\u003c=1.0.5.8" }, { "model": "rv220w", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.5.8" }, { "model": "rv180", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1.0.3.10" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08189" }, { "db": "JVNDB", "id": "JVNDB-2014-005296" }, { "db": "NVD", "id": "CVE-2014-2179" }, { "db": "CNNVD", "id": "CNNVD-201411-101" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv180_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.3.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv180:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv120w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.5.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv120w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:rv220w_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.5.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-2179" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Yorick Koster of Securify", "sources": [ { "db": "BID", "id": "70920" } ], "trust": 0.3 }, "cve": "CVE-2014-2179", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2014-2179", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2014-08189", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-70118", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-2179", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2014-08189", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201411-101", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-70118", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08189" }, { "db": "VULHUB", "id": "VHN-70118" }, { "db": "JVNDB", "id": "JVNDB-2014-005296" }, { "db": "NVD", "id": "CVE-2014-2179" }, { "db": "CNNVD", "id": "CNNVD-201411-101" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to upload files to arbitrary locations via a crafted HTTP request, aka Bug ID CSCuh86998. Vendors have confirmed this vulnerability Bug ID CSCuh86998 It is released as.Skillfully crafted by a third party HTTP A file may be uploaded to any location via a request. An attacker could exploit this vulnerability to upload arbitrary files. \nThis issue is being tracked by Cisco Bug ID CSCuh86998. are all products of Cisco (Cisco). \n\n------------------------------------------------------------------------\nDetails\n------------------------------------------------------------------------\nhttps://www.securify.nl/advisory/SFY20130601/cisco_rv_series_multiple_vulnerabilities.html\n\n------------------------------------------------------------------------\nReferences\n------------------------------------------------------------------------\n[1] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2177\n[2] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2178\n[3] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2179\n[4]\nhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv \n", "sources": [ { "db": "NVD", "id": "CVE-2014-2179" }, { "db": "JVNDB", "id": "JVNDB-2014-005296" }, { "db": "CNVD", "id": "CNVD-2014-08189" }, { "db": "BID", "id": "70920" }, { "db": "VULHUB", "id": "VHN-70118" }, { "db": "PACKETSTORM", "id": "128992" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2179", "trust": 3.5 }, { "db": "PACKETSTORM", "id": "128992", "trust": 1.2 }, { "db": "SECTRACK", "id": "1031171", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2014-005296", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201411-101", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-08189", "trust": 0.6 }, { "db": "BID", "id": "70920", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-70118", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08189" }, { "db": "VULHUB", "id": "VHN-70118" }, { "db": "BID", "id": "70920" }, { "db": "JVNDB", "id": "JVNDB-2014-005296" }, { "db": "PACKETSTORM", "id": "128992" }, { "db": "NVD", "id": "CVE-2014-2179" }, { "db": "CNNVD", "id": "CNNVD-201411-101" } ] }, "id": "VAR-201411-0402", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-08189" }, { "db": "VULHUB", "id": "VHN-70118" } ], "trust": 1.32253884 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08189" } ] }, "last_update_date": "2023-12-18T12:21:07.698000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20141105-rv", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20141105-rv" }, { "title": "36242", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=36242" }, { "title": "Cisco RV router firmware patch for arbitrary file upload vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/51780" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08189" }, { "db": "JVNDB", "id": "JVNDB-2014-005296" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-70118" }, { "db": "JVNDB", "id": "JVNDB-2014-005296" }, { "db": "NVD", "id": "CVE-2014-2179" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20141105-rv" }, { "trust": 1.5, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2179" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "trust": 1.1, "url": "http://seclists.org/fulldisclosure/2014/nov/6" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/128992/cisco-rv-overwrite-csrf-command-execution.html" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1031171" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98499" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2179" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2177" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2177" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2179" }, { "trust": 0.1, "url": "https://www.securify.nl/advisory/sfy20130601/cisco_rv_series_multiple_vulnerabilities.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2178" }, { "trust": 0.1, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2178" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-08189" }, { "db": "VULHUB", "id": "VHN-70118" }, { "db": "BID", "id": "70920" }, { "db": "JVNDB", "id": "JVNDB-2014-005296" }, { "db": "PACKETSTORM", "id": "128992" }, { "db": "NVD", "id": "CVE-2014-2179" }, { "db": "CNNVD", "id": "CNNVD-201411-101" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-08189" }, { "db": "VULHUB", "id": "VHN-70118" }, { "db": "BID", "id": "70920" }, { "db": "JVNDB", "id": "JVNDB-2014-005296" }, { "db": "PACKETSTORM", "id": "128992" }, { "db": "NVD", "id": "CVE-2014-2179" }, { "db": "CNNVD", "id": "CNNVD-201411-101" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-11-11T00:00:00", "db": "CNVD", "id": "CNVD-2014-08189" }, { "date": "2014-11-07T00:00:00", "db": "VULHUB", "id": "VHN-70118" }, { "date": "2014-11-05T00:00:00", "db": "BID", "id": "70920" }, { "date": "2014-11-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005296" }, { "date": "2014-11-06T12:02:22", "db": "PACKETSTORM", "id": "128992" }, { "date": "2014-11-07T11:55:02.517000", "db": "NVD", "id": "CVE-2014-2179" }, { "date": "2014-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-101" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-11-11T00:00:00", "db": "CNVD", "id": "CNVD-2014-08189" }, { "date": "2018-10-09T00:00:00", "db": "VULHUB", "id": "VHN-70118" }, { "date": "2014-11-24T00:58:00", "db": "BID", "id": "70920" }, { "date": "2014-11-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005296" }, { "date": "2018-10-09T19:43:10.847000", "db": "NVD", "id": "CVE-2014-2179" }, { "date": "2014-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-101" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-101" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco RV Router Vulnerability in uploading files to arbitrary locations in firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005296" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-101" } ], "trust": 0.6 } }
cve-2015-6358
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/566724 | third-party-advisory, x_refsource_CERT-VN | |
http://www.securitytracker.com/id/1034258 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/78047 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1034255 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1034257 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id/1034256 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:22:20.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#566724", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/566724" }, { "name": "1034258", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034258" }, { "name": "78047", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/78047" }, { "name": "1034255", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034255" }, { "name": "20151125 Multiple Cisco Products Confidential Information Decryption Man-in-the-Middle Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci" }, { "name": "1034257", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034257" }, { "name": "1034256", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034256" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-12T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "VU#566724", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/566724" }, { "name": "1034258", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034258" }, { "name": "78047", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/78047" }, { "name": "1034255", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034255" }, { "name": "20151125 Multiple Cisco Products Confidential Information Decryption Man-in-the-Middle Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci" }, { "name": "1034257", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034257" }, { "name": "1034256", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034256" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-6358", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#566724", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/566724" }, { "name": "1034258", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034258" }, { "name": "78047", "refsource": "BID", "url": "http://www.securityfocus.com/bid/78047" }, { "name": "1034255", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034255" }, { "name": "20151125 Multiple Cisco Products Confidential Information Decryption Man-in-the-Middle Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci" }, { "name": "1034257", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034257" }, { "name": "1034256", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034256" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-6358", "datePublished": "2017-10-12T15:00:00", "dateReserved": "2015-08-17T00:00:00", "dateUpdated": "2024-08-06T07:22:20.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2178
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv | vendor-advisory, x_refsource_CISCO | |
http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98498 | vdb-entry, x_refsource_XF | |
http://seclists.org/fulldisclosure/2014/Nov/6 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/533917/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id/1031171 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "name": "cisco-cve20142178-csrf(98498)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98498" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "name": "1031171", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031171" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the administrative web interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to hijack the authentication of administrators, aka Bug ID CSCuh87145." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "name": "cisco-cve20142178-csrf(98498)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98498" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "name": "1031171", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031171" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2178", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in the administrative web interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to hijack the authentication of administrators, aka Bug ID CSCuh87145." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "name": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "name": "cisco-cve20142178-csrf(98498)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98498" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "name": "1031171", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031171" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2178", "datePublished": "2014-11-07T11:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2177
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv | vendor-advisory, x_refsource_CISCO | |
http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98497 | vdb-entry, x_refsource_XF | |
http://seclists.org/fulldisclosure/2014/Nov/6 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/533917/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id/1031171 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.768Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "name": "cisco-cve20142177-command-exec(98497)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98497" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "name": "1031171", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031171" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The network-diagnostics administration interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote authenticated users to execute arbitrary commands via a crafted HTTP request, aka Bug ID CSCuh87126." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "name": "cisco-cve20142177-command-exec(98497)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98497" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "name": "1031171", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031171" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2177", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The network-diagnostics administration interface in the Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote authenticated users to execute arbitrary commands via a crafted HTTP request, aka Bug ID CSCuh87126." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "name": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "name": "cisco-cve20142177-command-exec(98497)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98497" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "name": "1031171", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031171" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2177", "datePublished": "2014-11-07T11:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2179
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv | vendor-advisory, x_refsource_CISCO | |
http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2014/Nov/6 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/533917/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98499 | vdb-entry, x_refsource_XF | |
http://www.securitytracker.com/id/1031171 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:05:59.993Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "name": "cisco-cve20142179-file-upload(98499)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98499" }, { "name": "1031171", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031171" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to upload files to arbitrary locations via a crafted HTTP request, aka Bug ID CSCuh86998." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "name": "cisco-cve20142179-file-upload(98499)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98499" }, { "name": "1031171", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031171" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-2179", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Cisco RV router firmware on RV220W devices, before 1.0.5.9 on RV120W devices, and before 1.0.4.14 on RV180 and RV180W devices allows remote attackers to upload files to arbitrary locations via a crafted HTTP request, aka Bug ID CSCuh86998." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20141105 Multiple Vulnerabilities in Cisco Small Business RV Series Routers", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141105-rv" }, { "name": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128992/Cisco-RV-Overwrite-CSRF-Command-Execution.html" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Nov/6" }, { "name": "20141106 Cisco RV Series multiple vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533917/100/0/threaded" }, { "name": "cisco-cve20142179-file-upload(98499)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98499" }, { "name": "1031171", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031171" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-2179", "datePublished": "2014-11-07T11:00:00", "dateReserved": "2014-02-25T00:00:00", "dateUpdated": "2024-08-06T10:05:59.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }