Saturday, March 1, 2025
HomeComputer SecurityCisco Fixed Routers Vulnerabilities that Allows Hackers to Run Remote Code with...

Cisco Fixed Routers Vulnerabilities that Allows Hackers to Run Remote Code with Root Access

Published on

SIEM as a Service

Follow Us on Google News

Cisco released security updates with the fixes for a serious security flaw that affected Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers and Cisco HyperFlex Software.

It consists of 6 vulnerabilities fixes, 4 vulnerabilities are marked under “High” severity and 2 vulnerabilities marked as “Medium” severity.

An information disclosure vulnerability CVE-2019-1653 in the web-based management interface of Cisco Small Business RV320 and RV325 allows a remote attacker to retrieve sensitive information.

RV320 and RV325 Routers Command Injection Vulnerability CVE-2019-1652 could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands.

Another vulnerability CVE-2019-1664 in Cisco HyperFlex Software could allow an unauthenticated, local attacker to gain root access to all nodes in the cluster due to insufficient authentication controls.

Another medium severity vulnerability that affected RV320 and RV325 Routers could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the service.

Fixed Vulnerabilities in Cisco Security Updates

Cisco HyperFlex Software Command Injection Vulnerability
Cisco HyperFlex Software Unauthenticated Root Access Vulnerability
Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability
Cisco Small Business RV320 and RV325 Routers Command Injection Vulnerability
Cisco Small Business RV320 and RV325 Routers Online Help Reflected Cross-Site Scripting Vulnerability
Cisco Small Business RV320 and RV325 Routers Weak Credential Encryption Vulnerability

Cisco advised urged users to apply these patches immediately to keep the network safe and secure.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Master in Wireshark Network Analysis to keep your self-updated.

Also Read:

Hackers Exploiting More than 9000 Cisco RV320/RV325 Routers After POC published in GitHub

Unpatched Critical Flaw in Cisco Small Business Switches Allows Attackers to Bypass User Authentication

Cisco Released Security Updates & Fixed Several Vulnerabilities that Affected Cisco Products

Privilege Escalation Flaw in Cisco ASA Allows Attackers To Read or Write Files in the System

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cl0p Ransomware Hide Itself on Compromised Networks After Exfiltrate the Data

The Cl0p ransomware group, a prominent player in the cybercrime landscape since 2019, has...

Ratatouille Malware Bypass UAC Control & Exploits I2P Network to Launch Cyber Attacks

A newly discovered malware, dubbed "Ratatouille" (or I2PRAT), is raising alarms in the cybersecurity...

Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely

Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks...