Логотип exploitDog
bind:CVE-2019-1828
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1828

Количество 3

Количество 3

nvd логотип

CVE-2019-1828

почти 7 лет назад

A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-69rm-7rjq-rh7j

больше 3 лет назад

A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22.

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2019-01885

почти 7 лет назад

Уязвимость веб-интерфейса микропрограммного обеспечения маршрутизаторов Cisco RV320 и Cisco RV325, позволяющая нарушителю реализовать атаку типа «человек посередине»

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1828

A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22.

CVSS3: 5.9
0%
Низкий
почти 7 лет назад
github логотип
GHSA-69rm-7rjq-rh7j

A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22.

CVSS3: 8.1
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-01885

Уязвимость веб-интерфейса микропрограммного обеспечения маршрутизаторов Cisco RV320 и Cisco RV325, позволяющая нарушителю реализовать атаку типа «человек посередине»

CVSS3: 8.1
0%
Низкий
почти 7 лет назад

Уязвимостей на страницу