Vulnerability CVE-2014-0659


Published: 2014-01-12

Description:
The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Cisco -> Rvs4000 
Cisco -> Wap4410n 
Cisco -> Wrvs4400n 
Cisco -> Rvs4000 firmware 
Cisco -> Wap4410n firmware 
Cisco -> Wrvs4400n firmware 

 References:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd
http://tools.cisco.com/security/center/viewAlert.x?alertId=32381
http://www.securityfocus.com/bid/64776
http://www.securitytracker.com/id/1029579
http://www.securitytracker.com/id/1029580
http://xforce.iss.net/xforce/xfdb/90233
https://github.com/elvanderb/TCP-32764

Copyright 2024, cxsecurity.com

 

Back to Top