Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Cisco Small Business RV Series Confidential Information Decryption Man-in-the-Middle Vulnerability

Information

Severity

Severity

Medium

Family

Family

CISCO

CVSSv2 Base

CVSSv2 Base

4.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:N/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

5 years ago

Modified

Modified

3 years ago

Summary

A vulnerability in the cryptographic implementation of the RV320 Dual Gigabit WAN VPN Router and the RV325 Dual Gigabit WAN VPN Router could allow an unauthenticated, remote attacker to make use of hard-coded certificate and keys embedded within the firmware of the affected device.

Insight

Insight

The vulnerability is due to the lack of unique key and certificate generation within affected appliances. This is an attack on the client attempting to access the device and does not compromise the device itself. To exploit the issue, an attacker needs not only the public and private key pair but also a privileged position in the network that would allow him or her to monitor the traffic between client and server, intercept the traffic, and modify or inject its own traffic.

Affected Software

Affected Software

RV320 Dual Gigabit WAN VPN Router and RV325 Dual Gigabit WAN VPN Router.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to Firmware version 1.3.1.12

Common Vulnerabilities and Exposures (CVE)