CVE-2011-1647
Published May 31, 2011
Last updated 13 years ago
Overview
- Description
- The web management interface on the Cisco RVS4000 Gigabit Security Router with software 1.x before 1.3.3.4 and 2.x before 2.0.2.7, and the WRVS4400N Gigabit Security Router with software before 2.0.2.1, allows remote attackers to read the private key for the admin SSL certificate via unspecified vectors, aka Bug ID CSCtn23871.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rvs4000:1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDEB65FB-54C5-4574-9208-F3E3EE823B96" }, { "criteria": "cpe:2.3:h:cisco:rvs4000:2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF7E4042-1F62-4DF7-A624-2F492F792937" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5363CFAF-439E-488C-9E97-BE04D80A4F9D" }, { "criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "096FB511-0E5D-46B6-827B-EAB242E015EA" }, { "criteria": "cpe:2.3:a:cisco:rvs4000_software:1.3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "567C5658-57F0-4BBA-9849-9A77504102FC" }, { "criteria": "cpe:2.3:a:cisco:rvs4000_software:2.0.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2596081A-DFA3-4006-9B7C-EE3A29ED0341" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wrvs4400n:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9D4BF4B-0360-4A3B-8843-1D5E84CA948E" }, { "criteria": "cpe:2.3:h:cisco:wrvs4400n:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C01433D-F43E-4574-BC04-1F0C060BBFC4" }, { "criteria": "cpe:2.3:h:cisco:wrvs4400n:2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3C11E2E-B910-45EC-A8FA-6BAAFFD26ED3" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C754BA1B-7DEC-49F4-835F-1EDA9289E19D" }, { "criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A0606AC-B349-411A-8D45-213A60FCFD08" }, { "criteria": "cpe:2.3:a:cisco:wrvs4400n_software:1.3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1CE7344-400B-4E2F-B9DF-C2B0BB74B080" }, { "criteria": "cpe:2.3:a:cisco:wrvs4400n_software:2.0.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEB82F7E-A77E-400A-B894-3207026826C9" } ], "operator": "OR" } ], "operator": "AND" } ]