HIGH · 10.0

CVE-2014-0659

The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote ...

Vulnerability Description

The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.

CVSS Score

10.0

HIGH

AV:N/AC:L/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
CiscoRvs4000 Firmware<= 2.0.3.2
CiscoRvs4000-
CiscoWrvs4400N Firmware1.1.03
CiscoWrvs4400N-
CiscoWap4410N Firmware<= 2.0.6.1
CiscoWap4410N-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-0659?

CVE-2014-0659 is a vulnerability with a CVSS score of 10.0 (HIGH). The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote ...

How severe is CVE-2014-0659?

CVE-2014-0659 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-0659?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Rvs4000 Firmware, Cisco Rvs4000, Cisco Wrvs4400N Firmware, Cisco Wrvs4400N, Cisco Wap4410N Firmware.