Cisco Management Authentication Bypass Vulnerability
Date: 27 January 2016
The purpose of this alert is to bring attention to recent critical software updates that address a disclosed vulnerability in Cisco RV220W product.
CCIRC is aware of a recently disclosed vulnerability in Cisco RV220W product.
Cisco RV220W Wireless Security Firewall devices could allow an unauthenticated remote attacker to bypass authentication and gain administrative privileges on a targeted device. This vulnerability could be exploited by sending a crafted HTTP request containing malicious SQL statement to the management interface of the targeted device.
Affected Product Versions:
Cisco RV220W running firmware releases prior to 18.104.22.168
NON Affected Product Versions:
Cisco RV120W Wireless-N VPN Firewall
Cisco RV180 VPN-Router
Cisco RV180W Wireless-N Multifunction VPN Router
Due to the elevated risk presented by this vulnerability, CCIRC recommends that system administrators test and deploy the vendor-released firmware update to affected versions accordingly. CCIRC recommends that priority is given to these patches.
Cisco RV220W Management Authentication Bypass Vulnerability
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: