<p>New vulnerability (CVE-2019-1663) in Cisco RV110W, RV130W, and RV215W devices allows for RCE attacks from malicious HTTP requests.</p>
<h3>Background</h3>
<p>Cisco has <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ci... target="_blank" rel="noopener noreferrer" title="Cisco security advisory for CVE-2019-1663">released a security advisory</a> for CVE-2019-1663, a remote code execution (RCE) vulnerability present in the remote management interface on certain router and firewall devices, the RV110W, RV130W, and RV215W. The vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code through malicious HTTP requests. Cisco has released firmware updates for the affected devices that address this vulnerability.</p>
<h3>Analysis</h3>
<p>Cisco has not released in-depth technical details on how to exploit this vulnerability, but notes that it was discovered by security researchers Yu Zhang and Haoliang Lu at the GeekPwn conference on October 24-25, 2018, and T. Shiomitsu of Pen Test Partners. The vulnerability is reportedly due to improperly validated user input fields through the HTTP/HTTPS user management interface.</p>
<p>Cisco has tagged this vulnerability with <a href="https://cwe.mitre.org/data/definitions/119.html" target="_blank" rel="noopener noreferrer" title="Cisco CWE-119">CWE-119</a>, the designation for a buffer overflow. This means that a pre-authentication user input field on these devices can be manipulated into dropping code into the device’s memory, which it then executes at the system level.</p>
<h3>Solution</h3>
<p>Cisco has released <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ci... target="_blank" rel="noopener noreferrer" title="Cisco firmware">updated firmware</a> for each of the respective devices to address this vulnerability.</p>
<p>Cisco states that this vulnerability is fixed in the following firmware versions:</p>
<ul>
<li>RV110W Wireless-N VPN Firewall: 1.2.2.1</li>
<li>RV130W Wireless-N Multifunction VPN Router: 1.0.3.45</li>
<li>RV215W Wireless-N VPN Router: 1.3.1.1</li>
</ul>
<h3>Identifying affected systems</h3>
<p>A list of Nessus plugins to identify this vulnerability will appear <a href="https://www.tenable.com/plugins/search?q=cves%3A(%22CVE-2019-1663%22)&sort=&page=1" target="_blank" rel="noopener noreferrer" title="Nessus Plugins for Cisco CVE-2019-1663">here</a> as they’re released.</p>
<h3>Get more information</h3>
<ul><li><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ci... target="_blank" rel="noopener noreferrer" title="Cisco Advisory for CVE-2019-1663">Cisco Advisory</a></li>
</ul>
<p><b><i>Join <a href="https://community.tenable.com/s/group/0F9f2000000fyxyCAA/cyber-exposure-... Security Response Team</a> on the Tenable Community.</i></b></p>
<p><b><i> Learn more about <a href="https://www.tenable.com/products">Tenable</a>, the first Cyber Exposure platform for holistic management of your modern attack surface. </i></b></p>
<p>Get a <a href="https://www.tenable.com/products/tenable-io/vulnerability-management/eva... 60-day trial</a> of Tenable.io Vulnerability Management.</p>
↧
Management Interfaces in Three Models of Cisco Networking Devices Are Vulnerable to RCE Attacks
↧