ID

VAR-201911-1117


CVE

CVE-2019-15271


TITLE

Cisco Small Business RV Unreliable Data Deserialization Vulnerability in Series Router

Trust: 0.8

sources: JVNDB: JVNDB-2019-012823

DESCRIPTION

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges. Cisco Small Business RV A series router contains an unreliable data deserialization vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Cisco RV016 Multi-WAN VPN Router is a VPN (Virtual Private Network) router from Cisco (Cisco)

Trust: 2.25

sources: NVD: CVE-2019-15271 // JVNDB: JVNDB-2019-012823 // CNVD: CNVD-2019-39767 // VULMON: CVE-2019-15271

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-39767

AFFECTED PRODUCTS

vendor:ciscomodel:rv016 multi-wan vpnscope:ltversion:4.2.3.10

Trust: 1.0

vendor:ciscomodel:rv042 dual wan vpnscope:ltversion:4.2.3.10

Trust: 1.0

vendor:ciscomodel:rv082 dual wan vpnscope:ltversion:4.2.3.10

Trust: 1.0

vendor:ciscomodel:rv042g dual gigabit wan vpnscope:ltversion:4.2.3.10

Trust: 1.0

vendor:ciscomodel:rv016 multi-wan vpnscope: - version: -

Trust: 0.8

vendor:ciscomodel:rv042 dual wan vpnscope: - version: -

Trust: 0.8

vendor:ciscomodel:rv042g dual gigabit wan vpnscope: - version: -

Trust: 0.8

vendor:ciscomodel:rv082 dual wan vpnscope: - version: -

Trust: 0.8

vendor:ciscomodel:rv016 multi-wan vpn routerscope:ltversion:4.2.3.10

Trust: 0.6

vendor:ciscomodel:rv042 dual wan vpn routerscope:ltversion:4.2.3.10

Trust: 0.6

vendor:ciscomodel:rv042g dual gigabit wan vpn routerscope:ltversion:4.2.3.10

Trust: 0.6

vendor:ciscomodel:rv082 dual wan vpn routerscope:ltversion:4.2.3.10

Trust: 0.6

vendor:ciscomodel:rv082 dual wan vpnscope:eqversion: -

Trust: 0.6

vendor:ciscomodel:rv016 multi-wan vpnscope:eqversion: -

Trust: 0.6

vendor:ciscomodel:rv042g dual gigabit wan vpnscope:eqversion: -

Trust: 0.6

vendor:ciscomodel:rv042 dual wan vpnscope:eqversion: -

Trust: 0.6

sources: CNVD: CNVD-2019-39767 // JVNDB: JVNDB-2019-012823 // CNNVD: CNNVD-201911-377 // NVD: CVE-2019-15271

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-15271
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-15271
value: HIGH

Trust: 1.0

NVD: CVE-2019-15271
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-39767
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201911-377
value: HIGH

Trust: 0.6

VULMON: CVE-2019-15271
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-15271
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-39767
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

ykramarz@cisco.com: CVE-2019-15271
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-15271
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2019-39767 // VULMON: CVE-2019-15271 // JVNDB: JVNDB-2019-012823 // CNNVD: CNNVD-201911-377 // NVD: CVE-2019-15271 // NVD: CVE-2019-15271

PROBLEMTYPE DATA

problemtype:CWE-502

Trust: 1.8

sources: JVNDB: JVNDB-2019-012823 // NVD: CVE-2019-15271

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201911-377

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201911-377

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-012823

PATCH

title:cisco-sa-20191106-sbrv-cmd-xurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbrv-cmd-x

Trust: 0.8

title:Patch for Multiple Cisco products arbitrary command execution vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/189231

Trust: 0.6

title:Multiple Cisco Product code issue vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=101794

Trust: 0.6

title:Cisco: Cisco Small Business RV016, RV042, RV042G, and RV082 Routers Arbitrary Command Execution Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20191106-sbrv-cmd-x

Trust: 0.1

title:Known Exploited Vulnerabilities Detectorurl:https://github.com/Ostorlab/KEV

Trust: 0.1

sources: CNVD: CNVD-2019-39767 // VULMON: CVE-2019-15271 // JVNDB: JVNDB-2019-012823 // CNNVD: CNNVD-201911-377

EXTERNAL IDS

db:NVDid:CVE-2019-15271

Trust: 3.1

db:JVNDBid:JVNDB-2019-012823

Trust: 0.8

db:CNVDid:CNVD-2019-39767

Trust: 0.6

db:CNNVDid:CNNVD-201911-377

Trust: 0.6

db:VULMONid:CVE-2019-15271

Trust: 0.1

sources: CNVD: CNVD-2019-39767 // VULMON: CVE-2019-15271 // JVNDB: JVNDB-2019-012823 // CNNVD: CNNVD-201911-377 // NVD: CVE-2019-15271

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191106-sbrv-cmd-x

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-15271

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15271

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/502.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20191106-sbrv-cmd-x

Trust: 0.1

url:https://github.com/ostorlab/kev

Trust: 0.1

url:https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/110796

Trust: 0.1

sources: CNVD: CNVD-2019-39767 // VULMON: CVE-2019-15271 // JVNDB: JVNDB-2019-012823 // CNNVD: CNNVD-201911-377 // NVD: CVE-2019-15271

SOURCES

db:CNVDid:CNVD-2019-39767
db:VULMONid:CVE-2019-15271
db:JVNDBid:JVNDB-2019-012823
db:CNNVDid:CNNVD-201911-377
db:NVDid:CVE-2019-15271

LAST UPDATE DATE

2024-08-14T13:44:35.555000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-39767date:2019-11-08T00:00:00
db:VULMONid:CVE-2019-15271date:2019-12-11T00:00:00
db:JVNDBid:JVNDB-2019-012823date:2019-12-13T00:00:00
db:CNNVDid:CNNVD-201911-377date:2019-12-12T00:00:00
db:NVDid:CVE-2019-15271date:2019-12-11T16:27:32.523

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-39767date:2019-11-08T00:00:00
db:VULMONid:CVE-2019-15271date:2019-11-26T00:00:00
db:JVNDBid:JVNDB-2019-012823date:2019-12-13T00:00:00
db:CNNVDid:CNNVD-201911-377date:2019-11-06T00:00:00
db:NVDid:CVE-2019-15271date:2019-11-26T03:15:11.050