多款Cisco产品信息泄露漏洞
CVE编号
CVE-2015-6358利用情况
暂无补丁情况
N/A披露时间
2017-10-13漏洞描述
Cisco RV320 Dual Gigabit WAN VPN是美国思科公司的路由器产品。 多款Cisco产品的加密机制未能生成唯一的密钥和证书,允许远程攻击者可通过实施暴力破解攻击获取用户的机密信息。解决建议
用户可参考如下厂商提供的安全补丁以修复该漏洞:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | cisco | pvc2300_firmware | * | Up to (including) 1.1.2.6 | |||||
运行在以下环境 | |||||||||
系统 | cisco | rtp300_firmware | * | Up to (including) 3.1.24 | |||||
运行在以下环境 | |||||||||
系统 | cisco | rv120w_firmware | * | Up to (including) 1.0.5.9 | |||||
运行在以下环境 | |||||||||
系统 | cisco | rv180w_firmware | * | Up to (including) 1.0.5.4 | |||||
运行在以下环境 | |||||||||
系统 | cisco | rv180_firmware | * | Up to (including) 1.0.5.4 | |||||
运行在以下环境 | |||||||||
系统 | cisco | rv220w_firmware | * | Up to (including) 1.0.4.17 | |||||
运行在以下环境 | |||||||||
系统 | cisco | rv315w_firmware | * | Up to (including) 1.01.03 | |||||
运行在以下环境 | |||||||||
系统 | cisco | rv320_firmware | * | Up to (including) 1.3.1.10 | |||||
运行在以下环境 | |||||||||
系统 | cisco | rv325_firmware | * | Up to (including) 1.3.1.10 | |||||
运行在以下环境 | |||||||||
系统 | cisco | rvs4000_firmware | * | Up to (including) 2.0.3.4 | |||||
运行在以下环境 | |||||||||
系统 | cisco | spa400_firmware | * | Up to (including) 1.1.2.2 | |||||
运行在以下环境 | |||||||||
系统 | cisco | srp520-u_firmware | * | Up to (including) 1.2.6 | |||||
运行在以下环境 | |||||||||
系统 | cisco | srp520_firmware | * | Up to (including) 1.01.29 | |||||
运行在以下环境 | |||||||||
系统 | cisco | srw224p_firmware | * | Up to (including) 2.0.2.4 | |||||
运行在以下环境 | |||||||||
系统 | cisco | wap2000_firmware | * | Up to (including) 2.0.8.0 | |||||
运行在以下环境 | |||||||||
系统 | cisco | wap200_firmware | * | Up to (including) 2.0.6.0 | |||||
运行在以下环境 | |||||||||
系统 | cisco | wap4400n_firmware | * | Up to (including) - | |||||
运行在以下环境 | |||||||||
系统 | cisco | wap4410n_firmware | * | Up to (including) 2.0.7.8 | |||||
运行在以下环境 | |||||||||
系统 | cisco | wet200_firmware | * | Up to (including) 2.0.8.0 | |||||
运行在以下环境 | |||||||||
系统 | cisco | wrp500_firmware | * | Up to (including) 1.0.1.002 | |||||
运行在以下环境 | |||||||||
系统 | cisco | wrv200_firmware | 1.0.39 | - | |||||
运行在以下环境 | |||||||||
系统 | cisco | wrv210_firmware | * | Up to (including) 2.0.1.5 | |||||
运行在以下环境 | |||||||||
系统 | cisco | wrvs4400n_firmware | * | Up to (including) 2.0.2.2 | |||||
运行在以下环境 | |||||||||
系统 | cisco | wvc2300_firmware | * | Up to (including) 1.1.2.6 | |||||
运行在以下环境 | |||||||||
硬件 | cisco | pvc2300 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | rtp300 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | rv120w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | rv180 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | rv180w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | rv220w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | rv315w | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | rv320 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | rv325 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | rvs4000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | spa400 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | srp520 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | srp520-u | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | srw224p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | wap200 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | wap2000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | wap4400n | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | wap4410n | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | wet200 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | wrp500 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | wrv200 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | wrv210 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | wrvs4400n | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | wvc2300 | - | - | |||||
- 攻击路径 网络
- 攻击复杂度 高
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 高
- 完整性 无
CWE-ID | 漏洞类型 |
CWE-295 | 证书验证不恰当 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论