CVE编号
CVE-2019-1653利用情况
暂无补丁情况
N/A披露时间
2019-01-25漏洞描述
Cisco Small Business RV320和RV325双千兆位WAN VPN路由器基于Web的管理界面中的漏洞可能允许未经身份验证的远程攻击者检索敏感信息。该漏洞是由于对URL的访问控制不当造成的。攻击者可以通过HTTP或HTTPS连接到受影响的设备并请求特定的URL,从而利用此漏洞。成功利用此漏洞可能使攻击者下载路由器配置或详细的诊断信息。思科已经发布了解决此漏洞的固件更新。解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-info
参考链接 |
|
---|---|
http://packetstormsecurity.com/files/152260/Cisco-RV320-Unauthenticated-Confi... | |
http://packetstormsecurity.com/files/152261/Cisco-RV320-Unauthenticated-Diagn... | |
http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated... | |
http://seclists.org/fulldisclosure/2019/Mar/59 | |
http://seclists.org/fulldisclosure/2019/Mar/60 | |
http://www.securityfocus.com/bid/106732 | |
https://badpackets.net/over-9000-cisco-rv320-rv325-routers-vulnerable-to-cve-... | |
https://seclists.org/bugtraq/2019/Mar/53 | |
https://seclists.org/bugtraq/2019/Mar/54 | |
https://threatpost.com/scans-cisco-routers-code-execution/141218/ | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... | |
https://www.exploit-db.com/exploits/46262/ | |
https://www.exploit-db.com/exploits/46655/ | |
https://www.youtube.com/watch?v=bx0RQJDlGbY | |
https://www.zdnet.com/article/hackers-are-going-after-cisco-rv320rv325-router... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | cisco | rv320_firmware | 1.4.2.15 | - | |||||
运行在以下环境 | |||||||||
系统 | cisco | rv320_firmware | 1.4.2.17 | - | |||||
运行在以下环境 | |||||||||
系统 | cisco | rv325_firmware | 1.4.2.15 | - | |||||
运行在以下环境 | |||||||||
系统 | cisco | rv325_firmware | 1.4.2.17 | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | rv320 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | rv325 | - | - | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 高
- 完整性 无
还没有评论,来说两句吧...