#VU25646 Inadequate Encryption Strength in Cisco Systems, Inc products - CVE-2019-15126


| Updated: 2021-06-25

Vulnerability identifier: #VU25646

Vulnerability risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2019-15126

CWE-ID: CWE-326

Exploitation vector: Local network

Exploit availability: Yes

Vulnerable software:
Cisco Connected Grid Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco WAP571 Wireless-AC/N Premium Dual Radio Access Point with PoE
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco WAP571E Wireless-AC/N Premium Dual Radio Outdoor Access Point
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco Catalyst 9115 Series Wi-Fi 6 Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco Catalyst 9120 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc
RV110W Wireless-N VPN Firewall
Hardware solutions / Routers for home users
RV215W Wireless-N VPN Router
Hardware solutions / Routers for home users
Cisco Small Business RV130 Series VPN Routers
Hardware solutions / Routers for home users
Cisco Wireless IP Phone 8821
Hardware solutions / Office equipment, IP-phones, print servers

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to decrypt Wi-Fi frames.

The vulnerability exists because after an affected device handles a disassociation event it can send a limited number of Wi-Fi frames encrypted with a static, weak Pairwise Temporal Key (PTK). A remote attacker on the local network can acquire these frames and decrypt them with the static PTK without the knowledge of the security session establishment used to secure the Wi-Fi network.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Cisco Connected Grid Routers: All versions

Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router: All versions

RV110W Wireless-N VPN Firewall: All versions

RV215W Wireless-N VPN Router: All versions

Cisco Small Business RV130 Series VPN Routers: All versions

Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE: All versions

Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE: All versions

Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE: All versions

Cisco WAP571 Wireless-AC/N Premium Dual Radio Access Point with PoE: All versions

Cisco WAP571E Wireless-AC/N Premium Dual Radio Outdoor Access Point: All versions

Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point: All versions

Cisco Wireless IP Phone 8821: All versions

Cisco Catalyst 9115 Series Wi-Fi 6 Access Points: All versions

Cisco Catalyst 9120 Series Access Points: All versions


External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability