Lucene search

K
ciscoCiscoCISCO-SA-RV110W-STATIC-CRED-BMTWBWTY
HistoryJul 15, 2020 - 4:00 p.m.

Cisco Small Business RV110W Wireless-N VPN Firewall Static Default Credential Vulnerability

2020-07-1516:00:00
tools.cisco.com
14

EPSS

0.005

Percentile

76.2%

A vulnerability in the Telnet service of Cisco Small Business RV110W Wireless-N VPN Firewall Routers could allow an unauthenticated, remote attacker to take full control of the device with a high-privileged account.

The vulnerability exists because a system account has a default and static password. An attacker could exploit this vulnerability by using this default account to connect to the affected system. A successful exploit could allow the attacker to gain full control of an affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv110w-static-cred-BMTWBWTy [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv110w-static-cred-BMTWBWTy”]

Affected configurations

Vulners
Node
ciscorv110w_wireless-n_vpn_firewall_firmwareMatchany
OR
ciscorv110w_wireless-n_vpn_firewall_firmwareMatchany
VendorProductVersionCPE
ciscorv110w_wireless-n_vpn_firewall_firmwareanycpe:2.3:o:cisco:rv110w_wireless-n_vpn_firewall_firmware:any:*:*:*:*:*:*:*

EPSS

0.005

Percentile

76.2%

Related for CISCO-SA-RV110W-STATIC-CRED-BMTWBWTY