Vulnerability Details : CVE-2014-0659
Public exploit exists!
The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685.
Products affected by CVE-2014-0659
- cpe:2.3:h:cisco:rvs4000:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:wrvs4400n:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:rvs4000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:rvs4000_firmware:2.0.2.7:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:rvs4000_firmware:2.0.0.3:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:rvs4000_firmware:1.3.3.5:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:rvs4000_firmware:1.3.2.0:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:wrvs4400n_firmware:2.0.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:wrvs4400n_firmware:2.0.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:wrvs4400n_firmware:1.1.13:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:wrvs4400n_firmware:1.1.03:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:wap4410n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:wap4410n_firmware:2.0.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:wap4410n_firmware:2.0.4.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:wap4410n_firmware:2.0.3.3:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:wap4410n:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-0659
37.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2014-0659
-
SerComm Network Device Backdoor Detection
Disclosure Date: 2013-12-31First seen: 2020-04-26auxiliary/scanner/misc/sercomm_backdoor_scannerThis module can identify SerComm manufactured network devices which contain a backdoor, allowing command injection or account disclosure. Authors: - Eloi Vanderbeken <eloi.vanderbeken@gmail.com> - Matt "hostess" Andreko <mandreko@accuvant.com>
CVSS scores for CVE-2014-0659
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2014-0659
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0659
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd
Undocumented Test Interface in Cisco Small Business DevicesVendor Advisory
-
http://www.securitytracker.com/id/1029580
Cisco Access Points Undocumented Test Interface Lets Remote Users Gain Root Access - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1029579
Cisco Gigabit Security Router Undocumented Test Interface Lets Remote Users Gain Root Access - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/64776
Cisco RVS4000/WRVS4400N/WAP4410N Devices Test Interface Remote Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
-
http://tools.cisco.com/security/center/viewAlert.x?alertId=32381
Cisco Small Business Devices Undocumented Test Interface Unauthorized Access VulnerabilityVendor Advisory
-
https://github.com/elvanderb/TCP-32764
GitHub - elvanderb/TCP-32764: some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.Patch;Issue Tracking
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/90233
Cisco Small Business Devices privilege escalation CVE-2014-0659 Vulnerability Report
Jump to