Lucene search

K
ciscoCiscoCISCO-SA-20140110-SBD
HistoryJan 10, 2014 - 4:00 p.m.

Undocumented Test Interface in Cisco Small Business Devices

2014-01-1016:00:00
tools.cisco.com
17

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.332

Percentile

97.1%

A vulnerability in the Cisco WAP4410N Wireless-N Access Point, Cisco WRVS4400N Wireless-N Gigabit Security Router, and the Cisco RVS4000 4-port Gigabit Security Router could allow an unauthenticated, remote attacker to gain root-level access to an affected device.

Note: Additional research performed by Mr. Eloi Vanderbeken during April 2014 seems to indicate that some products may be affected by another vulnerability, introduced while fixing the original “TCP port 32764 Undocumented Test Interface” vulnerability. Cisco has confirmed the undocumented test interface has been completely removed by the firmware images listed in this advisory and cannot be re-enabled in the Cisco WAP4410N Wireless-N Access Point, Cisco WRVS4400N Wireless-N Gigabit Security Router, and the Cisco RVS4000 4-port Gigabit Security Router.

Cisco has released software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are not available.
This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd”]

Affected configurations

Vulners
Node
ciscorv320_dual_gigabit_wan_vpn_router_firmwareMatchany
OR
ciscowrvs4400nMatchany
OR
ciscowap4410nMatchany
OR
ciscorv320_dual_gigabit_wan_vpn_router_firmwareMatchany
OR
ciscowrvs4400nMatchany
OR
ciscowap4410nMatchany
VendorProductVersionCPE
ciscorv320_dual_gigabit_wan_vpn_router_firmwareanycpe:2.3:o:cisco:rv320_dual_gigabit_wan_vpn_router_firmware:any:*:*:*:*:*:*:*
ciscowrvs4400nanycpe:2.3:h:cisco:wrvs4400n:any:*:*:*:*:*:*:*
ciscowap4410nanycpe:2.3:h:cisco:wap4410n:any:*:*:*:*:*:*:*

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.332

Percentile

97.1%