A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.
History

Tue, 12 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2021-11-03'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2019-01-24T16:00:00Z

Updated: 2024-11-12T21:21:15.193Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1653

cve-icon Vulnrichment

Updated: 2024-08-04T18:20:28.354Z

cve-icon NVD

Status : Modified

Published: 2019-01-24T16:29:00.317

Modified: 2024-11-21T04:37:01.223

Link: CVE-2019-1653

cve-icon Redhat

No data.