Cisco Support Community
Community Member

RVS4000 - potential vulnerabilities

I just discovered Berkely's Netalyzr (
and ran it on my internal network and it reported potential vulnerabilities on my RVS4000 (portion of output at bottom of this)
I have RVS4000v1 running the latest firmware V1.3.3.5.

The potential vulnerabilities reported are ...



Can anyone tell me if these are real concerns?
I hope this posting makes Cisco aware of them if they are.


---- excerpt from Netalyzer output -------------------------------------------------------------------------------------------------------------------------------------------------------

We received UPnP responses from 1 device: this device provided a valid device description via its UPnP URL. This description, viewable

here , contains the following information about this gateway:

  • Name: Cisco VPN Router
  • Manufacturer: Cisco Systems.
  • Manufacturer URL:
  • Model name: 4-Port Gigabit Security Router with VPN
  • Model number: RVS4000
  • Model URL:
  • Model Description: Cisco VPN Router

This device appears to run "Linux/2.4.27-star, UPnP/1.0, Intel SDK for UPnP devices /1.2". This system may be vulnerable to




Everyone's tags (2)

RVS4000 - potential vulnerabilities

Hi Kris, although admirable and a good concern about the security and how stalwart a router may be, this router has been end of life / end of sale and has no further production or development releases for quite some time. Any problems will not be addressed further on this product from a development point of view.

If you have a reasonable concern that your network, business or whatever may be in jeopardy due to specific software exploits which are found within the router, the choice would be to use a different router (since they won't be fixed on this platform).

I can tell you the CVE-2012-5958 and 5959 are operation system flaws. This was classified as a "high vulnerability" by the US computer emergency readiness team.

This essentially means some random coding can be placed within UDP packets in the device field.

Please mark answered for helpful posts

-Tom Please mark answered for helpful posts

RVS4000 - potential vulnerabilities

Very interesting.  I've always been curious how 'secure' these routers really are.  One thing I always do is disable upnp.  Won't help when it doesn't change the situation, but it's one less thing.

The good thing about obsolete hardware/software is that all the hack attempts for them also fade as the hardware falls out of mainstream use.  Hackers are after good, current information (like credit card numbers), and this type of information isn't usually put on older platforms.  You know your data and what level of security you need.  If you don't feel safe, then you can always change the hardware like Tom suggested.   

Huntsville's Premiere Car and Bike e-magazine:

Huntsville's Premiere Car and Bike e-magazine:
CreatePlease to create content