CVE-2015-6397

Cisco RV110W, RV130W, and RV215W devices have an incorrect RBAC configuration for the default account, which allows remote authenticated users to obtain root access via a login session with that account, aka Bug IDs CSCuv90139, CSCux58175, and CSCux73557.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:rv110w_wireless-n_vpn_firewall_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:rv110w_wireless-n_vpn_firewall:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:rv130w_wireless-n_multifunction_vpn_router_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:rv130w_wireless-n_multifunction_vpn_router:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:34

Type Values Removed Values Added
References () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w2 - Mitigation, VDB Entry, Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w2 - Mitigation, VDB Entry, Vendor Advisory
References () http://www.securityfocus.com/bid/92273 - () http://www.securityfocus.com/bid/92273 -
References () http://www.securitytracker.com/id/1036524 - () http://www.securitytracker.com/id/1036524 -

Information

Published : 2016-08-08 00:59

Updated : 2024-11-21 02:34


NVD link : CVE-2015-6397

Mitre link : CVE-2015-6397

CVE.ORG link : CVE-2015-6397


JSON object : View

Products Affected

cisco

  • rv215w_wireless-n_vpn_router
  • rv130w_wireless-n_multifunction_vpn_router_firmware
  • rv110w_wireless-n_vpn_firewall_firmware
  • rv215w_wireless-n_vpn_router_firmware
  • rv130w_wireless-n_multifunction_vpn_router
  • rv110w_wireless-n_vpn_firewall
CWE
CWE-287

Improper Authentication