HIGH · 8.8

CVE-2015-6397

Cisco RV110W, RV130W, and RV215W devices have an incorrect RBAC configuration for the default account, which allows remote authenticated users to obtain root access via a login session with that accou...

Vulnerability Description

Cisco RV110W, RV130W, and RV215W devices have an incorrect RBAC configuration for the default account, which allows remote authenticated users to obtain root access via a login session with that account, aka Bug IDs CSCuv90139, CSCux58175, and CSCux73557.

CVSS Score

8.8

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
CiscoRv110W Wireless-N Vpn Firewall FirmwareAll versions
CiscoRv110W Wireless-N Vpn Firewall-
CiscoRv130W Wireless-N Multifunction Vpn Router FirmwareAll versions
CiscoRv130W Wireless-N Multifunction Vpn Router-
CiscoRv215W Wireless-N Vpn Router FirmwareAll versions
CiscoRv215W Wireless-N Vpn Router-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-6397?

CVE-2015-6397 is a vulnerability with a CVSS score of 8.8 (HIGH). Cisco RV110W, RV130W, and RV215W devices have an incorrect RBAC configuration for the default account, which allows remote authenticated users to obtain root access via a login session with that accou...

How severe is CVE-2015-6397?

CVE-2015-6397 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-6397?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Rv110W Wireless-N Vpn Firewall Firmware, Cisco Rv110W Wireless-N Vpn Firewall, Cisco Rv130W Wireless-N Multifunction Vpn Router Firmware, Cisco Rv130W Wireless-N Multifunction Vpn Router, Cisco Rv215W Wireless-N Vpn Router Firmware.