Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:rvs4000:1:*:*:*:*:*:*:*", "matchCriteriaId": "BDEB65FB-54C5-4574-9208-F3E3EE823B96", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:rvs4000:2:*:*:*:*:*:*:*", "matchCriteriaId": "FF7E4042-1F62-4DF7-A624-2F492F792937", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "5363CFAF-439E-488C-9E97-BE04D80A4F9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "096FB511-0E5D-46B6-827B-EAB242E015EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "567C5658-57F0-4BBA-9849-9A77504102FC", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:rvs4000_software:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "2596081A-DFA3-4006-9B7C-EE3A29ED0341", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:cisco:wrvs4400n:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D9D4BF4B-0360-4A3B-8843-1D5E84CA948E", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:wrvs4400n:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7C01433D-F43E-4574-BC04-1F0C060BBFC4", "vulnerable": true}, {"criteria": "cpe:2.3:h:cisco:wrvs4400n:2:*:*:*:*:*:*:*", "matchCriteriaId": "A3C11E2E-B910-45EC-A8FA-6BAAFFD26ED3", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C754BA1B-7DEC-49F4-835F-1EDA9289E19D", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A0606AC-B349-411A-8D45-213A60FCFD08", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1CE7344-400B-4E2F-B9DF-C2B0BB74B080", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:wrvs4400n_software:2.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "BEB82F7E-A77E-400A-B894-3207026826C9", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "The web management interface on the Cisco RVS4000 Gigabit Security Router with software 1.x before 1.3.3.4 and 2.x before 2.0.2.7, and the WRVS4400N Gigabit Security Router with software before 2.0.2.1, allows remote attackers to read the backup configuration file, and consequently execute arbitrary code, via unspecified vectors, aka Bug ID CSCtn23871."}, {"lang": "es", "value": "El interfaz de administraci\u00f3n web de Cisco RVS4000 Gigabit Security Router con software 1.x anteriores a 1.3.3.4 y 2.x anteriores a 2.0.2.7, y de WRVS4400N Gigabit Security Router con software anterior a la versi\u00f3n 2.0.2.1, permite a atacantes remotos leer el archivo de configuraci\u00f3n del backup, y por consiguiente ejecutar c\u00f3digo arbitrario, a trav\u00e9s de vectores sin especificar. Tambi\u00e9n conocido como Bug ID CSCtn23871."}], "id": "CVE-2011-1645", "lastModified": "2024-11-21T01:26:42.833", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2011-05-31T20:55:02.750", "references": [{"source": "ykramarz@cisco.com", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml"}, {"source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/47988"}, {"source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id?1025565"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/47988"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025565"}], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-16"}], "source": "nvd@nist.gov", "type": "Primary"}]}