Thursday, October 3, 2024
HomeComputer SecurityCisco Fixed Routers Vulnerabilities that Allows Hackers to Run Remote Code with...

Cisco Fixed Routers Vulnerabilities that Allows Hackers to Run Remote Code with Root Access

Published on

Cisco released security updates with the fixes for a serious security flaw that affected Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers and Cisco HyperFlex Software.

It consists of 6 vulnerabilities fixes, 4 vulnerabilities are marked under “High” severity and 2 vulnerabilities marked as “Medium” severity.

An information disclosure vulnerability CVE-2019-1653 in the web-based management interface of Cisco Small Business RV320 and RV325 allows a remote attacker to retrieve sensitive information.

- Advertisement - EHA

RV320 and RV325 Routers Command Injection Vulnerability CVE-2019-1652 could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands.

Another vulnerability CVE-2019-1664 in Cisco HyperFlex Software could allow an unauthenticated, local attacker to gain root access to all nodes in the cluster due to insufficient authentication controls.

Another medium severity vulnerability that affected RV320 and RV325 Routers could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the service.

Fixed Vulnerabilities in Cisco Security Updates

Cisco HyperFlex Software Command Injection Vulnerability
Cisco HyperFlex Software Unauthenticated Root Access Vulnerability
Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability
Cisco Small Business RV320 and RV325 Routers Command Injection Vulnerability
Cisco Small Business RV320 and RV325 Routers Online Help Reflected Cross-Site Scripting Vulnerability
Cisco Small Business RV320 and RV325 Routers Weak Credential Encryption Vulnerability

Cisco advised urged users to apply these patches immediately to keep the network safe and secure.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Master in Wireshark Network Analysis to keep your self-updated.

Also Read:

Hackers Exploiting More than 9000 Cisco RV320/RV325 Routers After POC published in GitHub

Unpatched Critical Flaw in Cisco Small Business Switches Allows Attackers to Bypass User Authentication

Cisco Released Security Updates & Fixed Several Vulnerabilities that Affected Cisco Products

Privilege Escalation Flaw in Cisco ASA Allows Attackers To Read or Write Files in the System

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

ANY.RUN Upgrades Threat Intelligence to Identify Emerging Threats

ANY.RUN announced an upgrade to its Threat Intelligence Portal, enhancing its capabilities to identify...

Cisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systems

A critical vulnerability has been discovered in Cisco's Nexus Dashboard Fabric Controller (NDFC), potentially...

Hackers Now Exploit Ivanti Endpoint Manager Vulnerability to Launch Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new...

Tor Browser 13.5.6 Released – What’s New!

The Tor Project has announced the release of Tor Browser 13.5.6, which is now...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

New RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDR

RansomHub has recently employed a novel attack method utilizing TDSSKiller and LaZagne, where TDSSKiller,...

Chinese Hackers Using Open Source Tools To Launch Cyber Attacks

Three Chinese state-backed threat groups, APT10, GALLIUM, and Stately Taurus, have repeatedly employed a...

Researchers Details Attacks On Air-Gaps Computers To Steal Data

The air-gap data protection method isolates local networks from the internet to mitigate cyber...