CVE-2016-1398
Published Jul 3, 2016
Last updated 7 years ago
Overview
- Description
- Buffer overflow in the web-based management interface on Cisco RV110W devices with firmware through 1.2.1.4, RV130W devices with firmware through 1.0.2.7, and RV215W devices with firmware through 1.3.0.7 allows remote authenticated users to cause a denial of service (device reload) via a crafted HTTP request, aka Bug ID CSCux86669.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.0.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECCF42F5-8626-4D23-85B9-95644C7E98BB" }, { "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41EC53E2-7AC9-4998-9917-4C510E2BCBA5" }, { "criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36A6781B-AC64-431F-959A-674F4C50F5C0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C3C9AFAA-1387-4067-AF7E-2E4AAD2A272A" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.1.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D028A9A-4CDF-4B67-829B-7B7E742FF04C" }, { "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F712711-18F7-4FB8-8EBC-B42DC59B67A7" }, { "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97FC925D-46ED-4AB5-B55B-64C2A0F131AC" }, { "criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "466E481B-7DD9-4AA0-B5E5-75BBE3820190" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "20E8ECAC-E842-41DB-9612-9374A9648DC2" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B109BB09-DF8C-4087-8C16-BF17D12A2863" }, { "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA7BD747-2A0C-4ADE-9CD8-391676F9C070" }, { "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F96C05D-C899-4D1B-B45A-A30F2DE3A731" }, { "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8A6EAAE-3AA3-4A52-97F0-71EC67677681" }, { "criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "962B7F13-6D32-476B-8940-86D9CDE6979D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv215w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8686AB22-F757-468A-930B-DDE45B508969" } ], "operator": "OR" } ], "operator": "AND" } ]