The random-number generator on Cisco Small Business RV routers 4.x and SA500 security appliances 2.2.07 does not have sufficient entropy, which makes it easier for remote attackers to determine a TLS key pair via unspecified computations upon handshake key-exchange data, aka Bug ID CSCus15224.
2015-12-13T03:59:09.477
2025-04-12T10:46:40.837
Deferred
CVSSv2: 4.3 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:N/A:N
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | cisco | sa520 | 2.2.07 | Yes |
Operating System | cisco | sa520w | 2.2.07 | Yes |
Operating System | cisco | sa540 | 2.2.07 | Yes |
Application | cisco | rv016_multi-wan_vpn_firmware | 4.0.0.7 | Yes |
Application | cisco | rv016_multi-wan_vpn_firmware | 4.0.2.8 | Yes |
Application | cisco | rv016_multi-wan_vpn_firmware | 4.0.5.0 | Yes |
Application | cisco | rv042_dual_wan_vpn_router_firmware | 4.0.2.8 | Yes |
Application | cisco | rv042g_dual_gigabit_wan_vpn_firmware | 4.0.0.7 | Yes |
Application | cisco | rv042g_dual_gigabit_wan_vpn_firmware | 4.2.2.7 | Yes |
Application | cisco | rv042g_dual_gigabit_wan_vpn_firmware | 4.2.2.8 | Yes |
Application | cisco | rv082_dual_wan_vpn_router_firmware | 4.0.0.7 | Yes |
Application | cisco | rv082_dual_wan_vpn_router_firmware | 4.0.2.8 | Yes |