ID

VAR-201904-0413


CVE

CVE-2019-1827


TITLE

Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Router Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2019-003274

DESCRIPTION

A vulnerability in the Online Help web service of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the service. The vulnerability exists because the Online Help web service of an affected device insufficiently validates user-supplied input. An attacker could exploit this vulnerability by persuading a user of the service to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected service or access sensitive browser-based information.This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22. The vulnerability stems from the lack of proper verification of client data by WEB applications. Attackers can use this vulnerability to execute client code. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue being tracked by Cisco Bug ID CSCvp09589

Trust: 2.43

sources: NVD: CVE-2019-1827 // JVNDB: JVNDB-2019-003274 // CNVD: CNVD-2020-22327 // BID: 107776

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-22327

AFFECTED PRODUCTS

vendor:ciscomodel:rv320scope:ltversion:1.4.2.22

Trust: 1.0

vendor:ciscomodel:rv325scope:ltversion:1.4.2.22

Trust: 1.0

vendor:ciscomodel:rv320 dual gigabit wan vpn routerscope:ltversion:1.4.2.22

Trust: 0.8

vendor:ciscomodel:rv325 dual gigabit wan vpn routerscope:ltversion:1.4.2.22

Trust: 0.8

vendor:ciscomodel:small business rv320scope:ltversion:1.4.2.22

Trust: 0.6

vendor:ciscomodel:small business rv325scope:ltversion:1.4.2.22

Trust: 0.6

vendor:ciscomodel:small business rv series routersscope:eqversion:1.4.2.20

Trust: 0.3

vendor:ciscomodel:small business rv series routersscope:eqversion:1.4.2.17

Trust: 0.3

vendor:ciscomodel:small business rv series routersscope:eqversion:1.4.2.15

Trust: 0.3

vendor:ciscomodel:small business rv series routersscope:eqversion:1.4.2.14

Trust: 0.3

vendor:ciscomodel:small business rv series routersscope:neversion:1.4.2.22

Trust: 0.3

sources: CNVD: CNVD-2020-22327 // BID: 107776 // JVNDB: JVNDB-2019-003274 // NVD: CVE-2019-1827

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1827
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1827
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1827
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-22327
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201904-256
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2019-1827
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2020-22327
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-1827
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.0

Trust: 2.8

sources: CNVD: CNVD-2020-22327 // JVNDB: JVNDB-2019-003274 // CNNVD: CNNVD-201904-256 // NVD: CVE-2019-1827 // NVD: CVE-2019-1827

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2019-003274 // NVD: CVE-2019-1827

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201904-256

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201904-256

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-003274

PATCH

title:cisco-sa-20190404-rv-xssurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-xss

Trust: 0.8

title:Patch for Cisco Small Business RV320 and Cisco Small Business RV325 Cross-Site Scripting Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/213485

Trust: 0.6

title:Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers Fixes for cross-site scripting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91109

Trust: 0.6

sources: CNVD: CNVD-2020-22327 // JVNDB: JVNDB-2019-003274 // CNNVD: CNNVD-201904-256

EXTERNAL IDS

db:NVDid:CVE-2019-1827

Trust: 3.3

db:BIDid:107776

Trust: 1.9

db:JVNDBid:JVNDB-2019-003274

Trust: 0.8

db:CNVDid:CNVD-2020-22327

Trust: 0.6

db:AUSCERTid:ESB-2019.1160

Trust: 0.6

db:CNNVDid:CNNVD-201904-256

Trust: 0.6

sources: CNVD: CNVD-2020-22327 // BID: 107776 // JVNDB: JVNDB-2019-003274 // CNNVD: CNNVD-201904-256 // NVD: CVE-2019-1827

REFERENCES

url:http://www.securityfocus.com/bid/107776

Trust: 2.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-1827

Trust: 2.0

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190404-rv-xss

Trust: 1.9

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1827

Trust: 0.8

url:https://www.auscert.org.au/bulletins/78506

Trust: 0.6

sources: CNVD: CNVD-2020-22327 // BID: 107776 // JVNDB: JVNDB-2019-003274 // CNNVD: CNNVD-201904-256 // NVD: CVE-2019-1827

CREDITS

Security Researcher John C. Hennessy-ReCar .,Cisco

Trust: 0.6

sources: CNNVD: CNNVD-201904-256

SOURCES

db:CNVDid:CNVD-2020-22327
db:BIDid:107776
db:JVNDBid:JVNDB-2019-003274
db:CNNVDid:CNNVD-201904-256
db:NVDid:CVE-2019-1827

LAST UPDATE DATE

2024-11-23T22:17:06.067000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-22327date:2020-04-12T00:00:00
db:BIDid:107776date:2019-04-04T00:00:00
db:JVNDBid:JVNDB-2019-003274date:2019-05-14T00:00:00
db:CNNVDid:CNNVD-201904-256date:2019-04-19T00:00:00
db:NVDid:CVE-2019-1827date:2024-11-21T04:37:28.887

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-22327date:2020-04-12T00:00:00
db:BIDid:107776date:2019-04-04T00:00:00
db:JVNDBid:JVNDB-2019-003274date:2019-05-14T00:00:00
db:CNNVDid:CNNVD-201904-256date:2019-04-04T00:00:00
db:NVDid:CVE-2019-1827date:2019-04-04T16:29:03.337