Логотип exploitDog
bind:CVE-2019-1653
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1653

Количество 3

Количество 3

nvd логотип

CVE-2019-1653

около 7 лет назад

A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.

CVSS3: 7.5
EPSS: Критический
github логотип

GHSA-j8w2-wx5p-fvx4

больше 3 лет назад

A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.

CVSS3: 7.5
EPSS: Критический
fstec логотип

BDU:2019-00340

около 7 лет назад

Уязвимость веб-интерфейса микропрограммного обеспечения маршрутизаторов Cisco Small Business RV320 и Cisco Small Business RV325, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1653

A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.

CVSS3: 7.5
94%
Критический
около 7 лет назад
github логотип
GHSA-j8w2-wx5p-fvx4

A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.

CVSS3: 7.5
94%
Критический
больше 3 лет назад
fstec логотип
BDU:2019-00340

Уязвимость веб-интерфейса микропрограммного обеспечения маршрутизаторов Cisco Small Business RV320 и Cisco Small Business RV325, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
94%
Критический
около 7 лет назад

Уязвимостей на страницу