Language:
http://www.nessus.org/u?2764da3f
http://www.nessus.org/u?f0f4af0a
Severity: High
ID: 121395
File Name: cisco-sa-20190123-rv-info_direct.nasl
Version: 1.14
Type: remote
Family: CGI abuses
Published: 1/25/2019
Updated: 2/25/2022
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 5
Temporal Score: 4.3
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Temporal Vector: E:H/RL:OF/RC:C
CVSS Score Source: CVE-2019-1653
Risk Factor: High
Base Score: 7.5
Temporal Score: 7.2
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Temporal Vector: E:H/RL:O/RC:C
CPE: cpe:/h:cisco:rv320_dual_gigabit_wan_vpn_router, cpe:/h:cisco:rv320_dual_gigabit_wan_wf_vpn_router, cpe:/h:cisco:rv325_dual_gigabit_wan_vpn_router, cpe:/h:cisco:rv325_dual_gigabit_wan_wf_vpn_router
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Available: true
Exploit Ease: Exploits are available
Exploited by Nessus: true
Patch Publication Date: 1/23/2019
Vulnerability Publication Date: 1/23/2019
CISA Known Exploited Dates: 5/3/2022
Metasploit (Cisco RV320 and RV325 Unauthenticated Remote Code Execution)
CVE: CVE-2019-1653
BID: 106732
CISCO-SA: cisco-sa-20190123-rv-info
CISCO-BUG-ID: CSCvg85922
IAVA: 2019-A-0356, 0001-A-0009-S
CISA-NCAS: AA22-011A