CVE-2011-1645
Published May 31, 2011
Last updated 13 years ago
Overview
- Description
- The web management interface on the Cisco RVS4000 Gigabit Security Router with software 1.x before 1.3.3.4 and 2.x before 2.0.2.7, and the WRVS4400N Gigabit Security Router with software before 2.0.2.1, allows remote attackers to read the backup configuration file, and consequently execute arbitrary code, via unspecified vectors, aka Bug ID CSCtn23871.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-16
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rvs4000:1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDEB65FB-54C5-4574-9208-F3E3EE823B96" }, { "criteria": "cpe:2.3:h:cisco:rvs4000:2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF7E4042-1F62-4DF7-A624-2F492F792937" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5363CFAF-439E-488C-9E97-BE04D80A4F9D" }, { "criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "096FB511-0E5D-46B6-827B-EAB242E015EA" }, { "criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "567C5658-57F0-4BBA-9849-9A77504102FC" }, { "criteria": "cpe:2.3:a:cisco:rvs4000_software:2.0.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2596081A-DFA3-4006-9B7C-EE3A29ED0341" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wrvs4400n:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9D4BF4B-0360-4A3B-8843-1D5E84CA948E" }, { "criteria": "cpe:2.3:h:cisco:wrvs4400n:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C01433D-F43E-4574-BC04-1F0C060BBFC4" }, { "criteria": "cpe:2.3:h:cisco:wrvs4400n:2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3C11E2E-B910-45EC-A8FA-6BAAFFD26ED3" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C754BA1B-7DEC-49F4-835F-1EDA9289E19D" }, { "criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A0606AC-B349-411A-8D45-213A60FCFD08" }, { "criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1CE7344-400B-4E2F-B9DF-C2B0BB74B080" }, { "criteria": "cpe:2.3:a:cisco:wrvs4400n_software:2.0.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEB82F7E-A77E-400A-B894-3207026826C9" } ], "operator": "OR" } ], "operator": "AND" } ]