—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
Cisco Security Advisory: Cisco CVR100W Wireless-N VPN Router Universal Plug-and-Play Buffer Overflow Vulnerability
Advisory ID: cisco-sa-20170503-cvr100w1
Revision: 1.0
For Public Release: 2017 May 3 16:00 GMT
Last Updated: 2017 May 3 16:00 GMT
CVE ID(s): CVE-2017-3882
CVSS Score v(3): 9.6 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
+———————————————————————
Summary
=======
A vulnerability in the Universal Plug-and-Play (UPnP) implementation in the Cisco CVR100W Wireless-N VPN Router could allow an unauthenticated, Layer 2???adjacent attacker to execute arbitrary code or cause a denial of service (DoS) condition. The remote code execution could occur with root privileges.
The vulnerability is due to incomplete range checks of the UPnP input data, which could result in a buffer overflow. An attacker could exploit this vulnerability by sending a malicious request to the UPnP listening port of the targeted device. An exploit could allow the attacker to cause the device to reload or potentially execute arbitrary code with root privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-cvr100w1 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-cvr100w1”]
—–BEGIN PGP SIGNATURE—–
iQKBBAEBAgBrBQJZCf90ZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg
SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx
NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHlPCxAAzEUNcA6uEKf9Ws8P
cinjaTejL3lfLaS9xpckEsulkl8AQqTfedKzwmu3XADBVHH/EZIf82UED6XF77qR
+qUVl9EfgqnmEx+HEOEsyCZ77lfim8cKy1HxFcORd9gAwtRE66nDPYTkzOC0t5Ez
M0Z5/SUFpwJAHH+DxGFX6hPRJkksddILKeq1kPSI9q6MPvMgpW3CfwH+4hKCsicz
qRAoWszo7DaOJ8Qxk2TOZXSsepeOJHo0venApputTmzEtKTK4jvOF+xZndRDQf0o
2c8QqHdxvmLgZgeGGMr/iNe398SOCxiJpkmTjDqPW9Np4Zo40mfn00CDwc4+Bdb2
+ZCkfexzELO81F53WGB0v5vAFySOU4UUXtWT+dT3nicDBM6nuFeL9YtKOCPDopdH
6oQfoHfBn18h3B8AiPD1caWAakQcllguC+ovwZYkv1UpoheyAbE3Qh3u5r2SpP0D
MwC5qL/8coHndhRhA8I8KVX6HPfzS+lbju2Hkx+O9ioRPmrXCtbhrCfcT1BWHnse
A3hYzE7kVReZTiHVOZj5YkpQNVFGhNCvr3JKxwvV8dHxy1U83BHAJyXWFecqaRt0
EoLtc8DcjEwvGB9cDx4npNCJpVgE2ICAr9pE6LlnhAy3Xrxr8x+2ifPgsji/JJVU
56SMCVsSMM39ptTbcGncOej//as=
=s4jy
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com