Language:
http://www.nessus.org/u?2764da3f
http://www.nessus.org/u?f0f4af0a
Severity: High
ID: 121395
File Name: cisco-sa-20190123-rv-info_direct.nasl
Version: 1.16
Type: remote
Family: CGI abuses
Published: 1/25/2019
Updated: 4/25/2023
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.1
Risk Factor: Medium
Base Score: 5
Temporal Score: 4.1
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS Score Source: CVE-2019-1653
Risk Factor: High
Base Score: 7.5
Temporal Score: 7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/h:cisco:rv320_dual_gigabit_wan_vpn_router, cpe:/h:cisco:rv320_dual_gigabit_wan_wf_vpn_router, cpe:/h:cisco:rv325_dual_gigabit_wan_vpn_router, cpe:/h:cisco:rv325_dual_gigabit_wan_wf_vpn_router
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Available: true
Exploit Ease: Exploits are available
Exploited by Nessus: true
Patch Publication Date: 1/23/2019
Vulnerability Publication Date: 1/23/2019
CISA Known Exploited Vulnerability Due Dates: 5/3/2022
Metasploit (Cisco RV320 and RV325 Unauthenticated Remote Code Execution)
CVE: CVE-2019-1653
BID: 106732
CISA-NCAS: AA22-011A
CISCO-SA: cisco-sa-20190123-rv-info
IAVA: 0001-A-0009-S, 2019-A-0356
CISCO-BUG-ID: CSCvg85922