CVE-2019-1843
Cisco RV110W, RV130W, and RV215W Routers Management Interface Denial of Service Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to reload the device and causing a DoS condition.
Una vulnerabilidad en la interfaz de administración basada en web de los enrutadores RV110W Wireless-N VPN Firewall, RV130W Wireless-N Multifunction VPN, and RV215W Wireless-N VPN de Cisco, podría permitir que un atacante remoto no autenticado causara una recarga de un dispositivo afectado, resultando en una condición de denegación de servicio (DoS). Esta vulnerabilidad es debido a la comprobación inapropiada de los datos suministrados por el usuario en la interfaz de administración basada en web. Un atacante podría explotar esta vulnerabilidad enviando peticiones HTTP maliciosas a un dispositivo específico. Una explotación con éxito podría permitir al atacante recargar el dispositivo y causar una condición DoS.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2018-12-06 CVE Reserved
- 2019-06-20 CVE Published
- 2024-11-10 EPSS Updated
- 2024-11-19 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/108864 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Rv110w Firmware Search vendor "Cisco" for product "Rv110w Firmware" | < 1.2.2.4 Search vendor "Cisco" for product "Rv110w Firmware" and version " < 1.2.2.4" | - |
Affected
| in | Cisco Search vendor "Cisco" | Rv110w Search vendor "Cisco" for product "Rv110w" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Rv130w Firmware Search vendor "Cisco" for product "Rv130w Firmware" | < 1.0.3.51 Search vendor "Cisco" for product "Rv130w Firmware" and version " < 1.0.3.51" | - |
Affected
| in | Cisco Search vendor "Cisco" | Rv130w Search vendor "Cisco" for product "Rv130w" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Rv215w Firmware Search vendor "Cisco" for product "Rv215w Firmware" | < 1.3.1.4 Search vendor "Cisco" for product "Rv215w Firmware" and version " < 1.3.1.4" | - |
Affected
| in | Cisco Search vendor "Cisco" | Rv215w Search vendor "Cisco" for product "Rv215w" | - | - |
Safe
|