Cisco has released a fix for their critical vulnerability, rating 9.8/10, that is a remote code execution vulnerability that is present in the management system RV110W Wireless-N VPN Firewall, RV130W Wireless-N Multifunction VPN Router and RV215W Wireless-N VPN Router Devices. The vulnerability (CVE-2019-1663), was rated critical because it could give an unauthenticated attacker the ability to remotely execute arbitrary code on any of the three affected devices. The flaw is based on the “improper restriction of operations within the bounds of a memory buffer where the software performs operations on a memory buffer, but it can read from or write to a memory location that is outside the intended boundary of the buffer.” This particular vulnerability will only affect the devices that allow custom configurations. Cisco stated that to be able to determine if the remote management feature is enabled, administrators can open up the web-based management system and choose Basic Systems> Remote Management, then check to see if the “Enable” box is checked.
Users who use one of the affected devices should first check to make sure they are up-to-date on the system. If the user is not up-to-date they should make sure they patch their device immediately to prevent this vulnerability from affecting them.