CVE-2019-15271
Published on November 26, 2019

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.

Vendor Advisory NVD

Known Exploited Vulnerability

This Cisco RV Series Routers Deserialization of Untrusted Data Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. A deserialization of untrusted data vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an attacker to execute code with root privileges.

The following remediation steps are recommended / required by June 22, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2019-15271 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.

What is a Marshaling, Unmarshaling Vulnerability?

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

CVE-2019-15271 has been classified to as a Marshaling, Unmarshaling vulnerability or weakness.


Products Associated with CVE-2019-15271

You can be notified by stack.watch whenever vulnerabilities like CVE-2019-15271 are published in these products:

What versions are vulnerable to CVE-2019-15271?

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.