CVE-2019-1828
Cisco Small Business RV320 and RV325 Routers Weak Credential Encryption Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22.
Una vulnerabilidad en la interfaz de administración web de los routers de Cisco Small Business RV320 y RV325 Dual Gigabit WAN VPN podría permitir que un atacante remoto sin autenticar acceda a las credenciales de administración. Esta vulnerabilidad existe debido a que los dispositivos afectados utilizan algoritmos de cifrado débiles para las credenciales de usuario. Un atacante podría explotar esta vulnerabilidad realizando un ataque Man-in-the-Middle (MitM) y descifrando las credenciales interceptadas. Un exploit con éxito podría permitir al atacante obtener acceso al un dispositivo afectado con privilegios de administrador. Esta vulnerabilidad afecta a los routers de Cisco Small Business RV320 y RV325 Dual Gigabit WAN VPN que tienen versiones de firmware anteriores a la 1.4.2.22.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2018-12-06 CVE Reserved
- 2019-04-04 CVE Published
- 2024-08-25 EPSS Updated
- 2024-11-21 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/107774 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Rv320 Firmware Search vendor "Cisco" for product "Rv320 Firmware" | < 1.4.2.22 Search vendor "Cisco" for product "Rv320 Firmware" and version " < 1.4.2.22" | - |
Affected
| in | Cisco Search vendor "Cisco" | Rv320 Search vendor "Cisco" for product "Rv320" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Rv325 Firmware Search vendor "Cisco" for product "Rv325 Firmware" | < 1.4.2.22 Search vendor "Cisco" for product "Rv325 Firmware" and version " < 1.4.2.22" | - |
Affected
| in | Cisco Search vendor "Cisco" | Rv325 Search vendor "Cisco" for product "Rv325" | - | - |
Safe
|