Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.105792
Kategorie:CISCO
Titel:Cisco RV220W Management Authentication Bypass Vulnerability
Zusammenfassung:A vulnerability in the web-based management interface of Cisco; RV220W Wireless Network Security Firewall devices could allow an unauthenticated, remote attacker; to bypass authentication and gain administrative privileges on a targeted device.
Beschreibung:Summary:
A vulnerability in the web-based management interface of Cisco
RV220W Wireless Network Security Firewall devices could allow an unauthenticated, remote attacker
to bypass authentication and gain administrative privileges on a targeted device.

Vulnerability Insight:
The vulnerability is due to insufficient input validation of
HTTP request headers that are sent to the web-based management interface of an affected device.
An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted HTTP
request that contains malicious SQL statements to the management interface of a targeted device.
Depending on whether remote management is configured for the device, the management interface may
use the SQL code in the HTTP request header to determine user privileges for the device.

Vulnerability Impact:
A successful exploit could allow the attacker to bypass
authentication on the management interface and gain administrative privileges on the device.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-6319
Cisco Security Advisory: 20160127 Cisco RV220W Management Authentication Bypass Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-rv220
http://www.securitytracker.com/id/1034830
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.