Lucene search

K
nvd[email protected]NVD:CVE-2019-15957
HistorySep 23, 2020 - 1:15 a.m.

CVE-2019-15957

2020-09-2301:15:12
CWE-20
web.nvd.nist.gov
7
cve-2019-15957
cisco
remote attacker
administrative privileges
arbitrary commands
user-supplied input
exploit
linux operating system
root user

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

44.2%

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system. When processed, the commands will be executed with root privileges. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by providing malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as the root user.

Affected configurations

Nvd
Node
ciscorv016_multi-wan_vpnMatch-
AND
ciscorv016_multi-wan_vpn_firmwareRange<4.2.3.10
Node
ciscorv042_dual_wan_vpnMatch-
AND
ciscorv042_dual_wan_vpnRange<4.2.3.10
Node
ciscorv042g_dual_gigabit_wan_vpnMatch-
AND
ciscorv042g_dual_gigabit_wan_vpn_firmwareRange<4.2.3.10
Node
ciscorv082_dual_wan_vpn_routerMatch-
AND
ciscorv082_dual_wan_vpn_router_firmwareRange<4.2.3.10
Node
ciscorv320_dual_gigabit_wan_vpn_routerMatch-
AND
ciscorv320_firmwareRange<1.5.1.05
Node
ciscorv325_dual_gigabit_wan_wf_vpn_routerMatch-
AND
ciscorv325_firmwareRange<1.5.1.05
VendorProductVersionCPE
ciscorv016_multi-wan_vpn-cpe:2.3:h:cisco:rv016_multi-wan_vpn:-:*:*:*:*:*:*:*
ciscorv016_multi-wan_vpn_firmware*cpe:2.3:o:cisco:rv016_multi-wan_vpn_firmware:*:*:*:*:*:*:*:*
ciscorv042_dual_wan_vpn-cpe:2.3:h:cisco:rv042_dual_wan_vpn:-:*:*:*:*:*:*:*
ciscorv042_dual_wan_vpn*cpe:2.3:o:cisco:rv042_dual_wan_vpn:*:*:*:*:*:*:*:*
ciscorv042g_dual_gigabit_wan_vpn-cpe:2.3:h:cisco:rv042g_dual_gigabit_wan_vpn:-:*:*:*:*:*:*:*
ciscorv042g_dual_gigabit_wan_vpn_firmware*cpe:2.3:o:cisco:rv042g_dual_gigabit_wan_vpn_firmware:*:*:*:*:*:*:*:*
ciscorv082_dual_wan_vpn_router-cpe:2.3:h:cisco:rv082_dual_wan_vpn_router:-:*:*:*:*:*:*:*
ciscorv082_dual_wan_vpn_router_firmware*cpe:2.3:o:cisco:rv082_dual_wan_vpn_router_firmware:*:*:*:*:*:*:*:*
ciscorv320_dual_gigabit_wan_vpn_router-cpe:2.3:h:cisco:rv320_dual_gigabit_wan_vpn_router:-:*:*:*:*:*:*:*
ciscorv320_firmware*cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 121

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

44.2%

Related for NVD:CVE-2019-15957