7 results (0.003 seconds)

CVSS: 5.9EPSS: 0%CPEs: 48EXPL: 0

Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913. Múltiples dispositivos con software de Cisco incorporado utilizan certificados X.509 embebidos y claves de host SSH embebidas en el firmware, lo que permite que atacantes remotos superen los mecanismos de protección criptográfica y realicen ataques Man-in-the-Middle (MitM) sabiendo de estos certificados y claves de otra instalación. Esto también se conoce por los siguientes Bug ID: CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899 y CSCuw90913. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci http://www.kb.cert.org/vuls/id/566724 http://www.securityfocus.com/bid/78047 http://www.securitytracker.com/id/1034255 http://www.securitytracker.com/id/1034256 http://www.securitytracker.com/id/1034257 http://www.securitytracker.com/id/1034258 • CWE-295: Improper Certificate Validation •

CVSS: 10.0EPSS: 0%CPEs: 34EXPL: 0

SQL injection vulnerability in the web-based management interface on Cisco RV220W devices allows remote attackers to execute arbitrary SQL commands via a crafted header in an HTTP request, aka Bug ID CSCuv29574. Vulnerabilidad de inyección SQL en la interfaz de gestión basada en web en dispositivos Cisco RV220W permite a atacantes remotos ejecutar comandos SQL arbitrarios a través de una cabecera manipulada en una petición HTTP, también conocida como Bug ID CSCuv29574. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220 http://www.securitytracker.com/id/1034830 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 37%CPEs: 16EXPL: 1

The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685. El punto de acceso Cisco WAP4410N con firmware hasta 2.0.6.1, router WRVS4400N con firmware 1.x hasta 1.1.13 y 2.x hasta 2.0.21, y router RVS4000 con firmware hasta 2.0.3.2 permite a atacantes remotos leer información de credenciales y configuración, y ejecutar comandos de forma arbitraria, a través de peticiones al interface test en el puerto TCP 32764, tambien conocido como Bug IDs CSCum37566, CSCum43693, CSCum43700, y CSCum43685. • https://www.exploit-db.com/exploits/30915 http://secunia.com/advisories/56292 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd http://tools.cisco.com/security/center/viewAlert.x?alertId=32381 http://www.securityfocus.com/bid/64776 http://www.securitytracker.com/id/1029579 http://www.securitytracker.com/id/1029580 https://exchange.xforce.ibmcloud.com/vulnerabilities/90233 https://github.com/elvanderb/TCP-32764 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.0EPSS: 0%CPEs: 13EXPL: 0

The web management interface on the Cisco RVS4000 Gigabit Security Router with software 1.x before 1.3.3.4 and 2.x before 2.0.2.7, and the WRVS4400N Gigabit Security Router with software before 2.0.2.1, allows remote attackers to read the private key for the admin SSL certificate via unspecified vectors, aka Bug ID CSCtn23871. El interfaz de administración web de Cisco RVS4000 Gigabit Security Router con software 1.x anteriores a 1.3.3.4 y 2.x anteriores a 2.0.2.7, y de WRVS4400N Gigabit Security Router con software anterior a la versión 2.0.2.1 permite a atacantes remotos leer la clave privada del certificado SSL admin a través de vectores sin especificar. También conocido como Bug ID CSCtn23871. • http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml http://www.securityfocus.com/bid/47985 http://www.securitytracker.com/id?1025565 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.3EPSS: 2%CPEs: 13EXPL: 0

The web management interface on the Cisco RVS4000 Gigabit Security Router with software 1.x before 1.3.3.4 and 2.x before 2.0.2.7, and the WRVS4400N Gigabit Security Router with software before 2.0.2.1, allows remote attackers to read the backup configuration file, and consequently execute arbitrary code, via unspecified vectors, aka Bug ID CSCtn23871. El interfaz de administración web de Cisco RVS4000 Gigabit Security Router con software 1.x anteriores a 1.3.3.4 y 2.x anteriores a 2.0.2.7, y de WRVS4400N Gigabit Security Router con software anterior a la versión 2.0.2.1, permite a atacantes remotos leer el archivo de configuración del backup, y por consiguiente ejecutar código arbitrario, a través de vectores sin especificar. También conocido como Bug ID CSCtn23871. • http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml http://www.securityfocus.com/bid/47988 http://www.securitytracker.com/id?1025565 • CWE-16: Configuration •