Risk | Low |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-15126 |
CWE-ID | CWE-326 |
Exploitation vector | Local network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
Cisco Connected Grid Routers Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco WAP571 Wireless-AC/N Premium Dual Radio Access Point with PoE Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco WAP571E Wireless-AC/N Premium Dual Radio Outdoor Access Point Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Catalyst 9115 Series Wi-Fi 6 Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Catalyst 9120 Series Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc RV110W Wireless-N VPN Firewall Hardware solutions / Routers for home users RV215W Wireless-N VPN Router Hardware solutions / Routers for home users Cisco Small Business RV130 Series VPN Routers Hardware solutions / Routers for home users Cisco Wireless IP Phone 8821 Hardware solutions / Office equipment, IP-phones, print servers |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU25646
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2019-15126
CWE-ID:
CWE-326 - Inadequate Encryption Strength
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to decrypt Wi-Fi frames.
The vulnerability exists because after an affected device handles a disassociation event it can send a limited number of Wi-Fi frames encrypted with a static, weak Pairwise Temporal Key (PTK). A remote attacker on the local network can acquire these frames and decrypt them with the static PTK without the knowledge of the security session establishment used to secure the Wi-Fi network.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsCisco Connected Grid Routers: All versions
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router: All versions
RV110W Wireless-N VPN Firewall: All versions
RV215W Wireless-N VPN Router: All versions
Cisco Small Business RV130 Series VPN Routers: All versions
Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE: All versions
Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE: All versions
Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE: All versions
Cisco WAP571 Wireless-AC/N Premium Dual Radio Access Point with PoE: All versions
Cisco WAP571E Wireless-AC/N Premium Dual Radio Outdoor Access Point: All versions
Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point: All versions
Cisco Wireless IP Phone 8821: All versions
Cisco Catalyst 9115 Series Wi-Fi 6 Access Points: All versions
Cisco Catalyst 9120 Series Access Points: All versions
CPE2.3Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.