ID

VAR-201608-0274


CVE

CVE-2015-6397


TITLE

plural Cisco In device products root Vulnerability for which access rights are acquired

Trust: 0.8

sources: JVNDB: JVNDB-2015-007227

DESCRIPTION

Cisco RV110W, RV130W, and RV215W devices have an incorrect RBAC configuration for the default account, which allows remote authenticated users to obtain root access via a login session with that account, aka Bug IDs CSCuv90139, CSCux58175, and CSCux73557. The Cisco RV110WRV130W and RV215W are Cisco router products. Multiple Cisco routers are prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCuv90139 CSCux58175 CSCux73557

Trust: 2.52

sources: NVD: CVE-2015-6397 // JVNDB: JVNDB-2015-007227 // CNVD: CNVD-2016-06160 // BID: 92273 // VULHUB: VHN-84358

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-06160

AFFECTED PRODUCTS

vendor:ciscomodel:rv215w wireless-n vpn routerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:rv110w wireless-n vpn firewallscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:rv130w wireless-n multifunction vpn routerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:rv215w wireless-n vpn routerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:rv130w wireless-n multifunction vpn routerscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:rv110w wireless-n vpn firewallscope:eqversion:0

Trust: 0.9

vendor:ciscomodel:rv110w wireless-n vpn firewallscope:eqversion: -

Trust: 0.8

vendor:ciscomodel:rv130w wireless-n multifunction vpn routerscope:eqversion: -

Trust: 0.8

vendor:ciscomodel:rv215w wireless-n vpn routerscope:eqversion: -

Trust: 0.8

vendor:ciscomodel:rv110w wireless-n vpn firewallscope: - version: -

Trust: 0.6

vendor:ciscomodel:rv130w wireless-n multifunction vpn routerscope: - version: -

Trust: 0.6

vendor:ciscomodel:rv215w wireless-n vpn routerscope: - version: -

Trust: 0.6

vendor:ciscomodel:rv215w wireless-n vpn routerscope:neversion:1.3.0.8

Trust: 0.3

vendor:ciscomodel:rv130w wireless-n multifunction vpn routerscope:neversion:1.0.3.16

Trust: 0.3

vendor:ciscomodel:rv110w wireless-n vpn firewallscope:neversion:1.2.1.7

Trust: 0.3

sources: CNVD: CNVD-2016-06160 // BID: 92273 // JVNDB: JVNDB-2015-007227 // CNNVD: CNNVD-201608-174 // NVD: CVE-2015-6397

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6397
value: HIGH

Trust: 1.0

NVD: CVE-2015-6397
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-06160
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201608-174
value: CRITICAL

Trust: 0.6

VULHUB: VHN-84358
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-6397
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-06160
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-84358
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-6397
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-06160 // VULHUB: VHN-84358 // JVNDB: JVNDB-2015-007227 // CNNVD: CNNVD-201608-174 // NVD: CVE-2015-6397

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-84358 // JVNDB: JVNDB-2015-007227 // NVD: CVE-2015-6397

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201608-174

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201608-174

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-007227

PATCH

title:cisco-sa-20160803-rv110_130w2url:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160803-rv110_130w2

Trust: 0.8

title:Patches for multiple Cisco product security bypass vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/80247

Trust: 0.6

title:Cisco RV110W , RV130W and RV215W Repair measures for device security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63567

Trust: 0.6

sources: CNVD: CNVD-2016-06160 // JVNDB: JVNDB-2015-007227 // CNNVD: CNNVD-201608-174

EXTERNAL IDS

db:NVDid:CVE-2015-6397

Trust: 3.4

db:BIDid:92273

Trust: 2.0

db:SECTRACKid:1036524

Trust: 1.1

db:JVNDBid:JVNDB-2015-007227

Trust: 0.8

db:CNNVDid:CNNVD-201608-174

Trust: 0.7

db:CNVDid:CNVD-2016-06160

Trust: 0.6

db:VULHUBid:VHN-84358

Trust: 0.1

sources: CNVD: CNVD-2016-06160 // VULHUB: VHN-84358 // BID: 92273 // JVNDB: JVNDB-2015-007227 // CNNVD: CNNVD-201608-174 // NVD: CVE-2015-6397

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160803-rv110_130w2

Trust: 2.6

url:http://www.securityfocus.com/bid/92273

Trust: 1.1

url:http://www.securitytracker.com/id/1036524

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6397

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6397

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2016-06160 // VULHUB: VHN-84358 // BID: 92273 // JVNDB: JVNDB-2015-007227 // CNNVD: CNNVD-201608-174 // NVD: CVE-2015-6397

CREDITS

Adam Zielinski

Trust: 0.3

sources: BID: 92273

SOURCES

db:CNVDid:CNVD-2016-06160
db:VULHUBid:VHN-84358
db:BIDid:92273
db:JVNDBid:JVNDB-2015-007227
db:CNNVDid:CNNVD-201608-174
db:NVDid:CVE-2015-6397

LAST UPDATE DATE

2024-11-23T22:52:39.564000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-06160date:2016-08-09T00:00:00
db:VULHUBid:VHN-84358date:2017-08-16T00:00:00
db:BIDid:92273date:2016-08-03T00:00:00
db:JVNDBid:JVNDB-2015-007227date:2016-08-17T00:00:00
db:CNNVDid:CNNVD-201608-174date:2016-08-08T00:00:00
db:NVDid:CVE-2015-6397date:2024-11-21T02:34:55.440

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-06160date:2016-08-09T00:00:00
db:VULHUBid:VHN-84358date:2016-08-08T00:00:00
db:BIDid:92273date:2016-08-03T00:00:00
db:JVNDBid:JVNDB-2015-007227date:2016-08-17T00:00:00
db:CNNVDid:CNNVD-201608-174date:2016-08-08T00:00:00
db:NVDid:CVE-2015-6397date:2016-08-08T00:59:01.267