ID CVE-2016-1325 Type cve Reporter cve@mitre.org Modified 2016-12-03T03:20:00
Description
The administration interface on Cisco DPC3939B and DPC3941 devices allows remote attackers to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCus49506.
{"cisco": [{"lastseen": "2020-12-24T11:41:24", "bulletinFamily": "software", "cvelist": ["CVE-2016-1325"], "description": "A vulnerability in the web-based administration interface of the Cisco Wireless Residential Gateway could allow an unauthenticated, remote attacker to access sensitive information on the affected device. \n\nThe vulnerability is caused by improper access restrictions implemented on the affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device.\n\nCisco has released software updates to its service\nprovider customers that address the vulnerability described in this\nadvisory. Prior to contacting Cisco TAC, customers are advised to\ncontact their service providers to confirm the software deployed by the\nservice provider includes the fix that addresses this vulnerability. Workarounds that mitigate this vulnerability are not available.\n\nThis advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160309-rgid[\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160309-rgid\"]", "modified": "2016-03-09T14:04:57", "published": "2016-03-09T16:00:00", "id": "CISCO-SA-20160309-RGID", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160309-rgid", "type": "cisco", "title": "Cisco Wireless Residential Gateway Information Disclosure Vulnerability", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}]}