Cisco Small Business RV320 and RV325 Routers Multiple Vulnerabilities

high Nessus Plugin ID 124061

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, this Cisco Small Business RV Series router is affected by multiple vulnerabilities:

- A vulnerability in the Online Help web service of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the service.The vulnerability exists because the Online Help web service of an affected device insufficiently validates user-supplied input. An attacker could exploit this vulnerability by persuading a user of the service to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected service or access sensitive browser-based information.
(CVE-2019-1827)

- A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials.The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in- the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. (CVE-2019-1828)

Please see the included Cisco BIDs and Cisco Security Advisory for more information

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvp09589 & CSCvp09573

See Also

http://www.nessus.org/u?7ea0bf3d

http://www.nessus.org/u?75b1813b

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp09589

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp09573

Plugin Details

Severity: High

ID: 124061

File Name: cisco-sa-20190404-rv-weak-encrypt.nasl

Version: 1.13

Type: remote

Family: CISCO

Published: 4/15/2019

Updated: 6/3/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2019-1828

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: x-cpe:/o:cisco:small_business_rv_series_router_firmware

Required KB Items: Cisco/Small_Business_Router/Version, Cisco/Small_Business_Router/Model

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/4/2019

Vulnerability Publication Date: 4/4/2019

Reference Information

CVE: CVE-2019-1827, CVE-2019-1828