HIGH · 7.8

CVE-2015-6396

The CLI command parser on Cisco RV110W, RV130W, and RV215W devices allows local users to execute arbitrary shell commands as an administrator via crafted parameters, aka Bug IDs CSCuv90134, CSCux58161...

Vulnerability Description

The CLI command parser on Cisco RV110W, RV130W, and RV215W devices allows local users to execute arbitrary shell commands as an administrator via crafted parameters, aka Bug IDs CSCuv90134, CSCux58161, and CSCux73567.

CVSS Score

7.8

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
CiscoRv110W Wireless-N Vpn Firewall FirmwareAll versions
CiscoRv110W Wireless-N Vpn Firewall-
CiscoRv130W Wireless-N Multifunction Vpn Router FirmwareAll versions
CiscoRv130W Wireless-N Multifunction Vpn Router-
CiscoRv215W Wireless-N Vpn Router FirmwareAll versions
CiscoRv215W Wireless-N Vpn Router-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-6396?

CVE-2015-6396 is a vulnerability with a CVSS score of 7.8 (HIGH). The CLI command parser on Cisco RV110W, RV130W, and RV215W devices allows local users to execute arbitrary shell commands as an administrator via crafted parameters, aka Bug IDs CSCuv90134, CSCux58161...

How severe is CVE-2015-6396?

CVE-2015-6396 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-6396?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Rv110W Wireless-N Vpn Firewall Firmware, Cisco Rv110W Wireless-N Vpn Firewall, Cisco Rv130W Wireless-N Multifunction Vpn Router Firmware, Cisco Rv130W Wireless-N Multifunction Vpn Router, Cisco Rv215W Wireless-N Vpn Router Firmware.