Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-1653


A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.


Published

2019-01-24T16:29:00.317

Last Modified

2025-02-06T16:09:13.310

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-284
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco rv320_firmware 1.4.2.15 Yes
Operating System cisco rv320_firmware 1.4.2.17 Yes
Hardware cisco rv320 - No
Operating System cisco rv325_firmware 1.4.2.15 Yes
Operating System cisco rv325_firmware 1.4.2.17 Yes
Hardware cisco rv325 - No

References