[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Cisco Security Advisory: Undocumented Test Interface in Cisco Small Business Devices
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] Cisco Security Advisory: Undocumented Test Interface in Cisco Small Business Devices
- From: Cisco Systems Product Security Incident Response Team <psirt@xxxxxxxxx>
- Date: Fri, 10 Jan 2014 13:31:44 -0500
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Undocumented Test Interface in Cisco Small Business Devices
Advisory ID: cisco-sa-20140110-sbd
Revision 1.0
For Public Release 2014 January 10 16:00 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
A vulnerability in the Cisco WAP4410N Wireless-N Access Point, Cisco WRVS4400N
Wireless-N Gigabit Security Router, and the Cisco RVS4000 4-port Gigabit
Security Router could allow an unauthenticated, remote attacker to gain
root-level access to an affected device.
Cisco will release free software updates that address these vulnerabilities.
Workarounds that mitigate these vulnerabilities are not available.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
iF4EAREIAAYFAlLQN78ACgkQUddfH3/BbTqu+wD/eWfAdt6H8ltKyHE4DT8SkTPM
j08MEAnhmkmuHjXSuwEA/0VbbYIOr1mqoOJEUbF3aFw7Veacwgk555uevEeC1/9b
=V3bU
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/