A security vulnerability (CVE ID: CVE-2019-1815, CVSSv3 SCORE: Base 7.5) was discovered in the Local Status Page performance of Cisco Meraki’s MX67 and MX68 security home appliance designs that may permit unauthenticated individuals to gain access to and download logs consisting of delicate, privileged gadget information. The vulnerability is because of inappropriate gain access to control to the files holding debugging and upkeep information and is just exploitable when the Local Status Page is allowed on the device. An attacker exploiting this vulnerability might obtain access to cordless pre-shared keys, Site-to-Site VPN key, and other sensitive information. Under particular circumstances, this information may permit an assaulter to acquire administrator-level access to the gadget.

Extra details on the details revealed can be discovered in the Details section of this advisory.


Affected items include just the MX67 and MX68 security appliances. It is only possible to exploit this vulnerability if the Local Status Page is enabled on the device and if the assaulter can gain either local network gain access to or physical access to the device. The Local Status Page is enabled by default on impacted devices. Each exploit effort would be scoped on a per-device basis offered these requirements.

An enemy able to effectively exploit this vulnerability may acquire access to delicate info, including but not restricted to:

* Active Directory qualifications (if ADVERTISEMENT integration has been set up on the gadget).

* wireless pre-shared secrets– if set up on the device.

* firmware version.

* device’s setup file.

* device’s identification number.

* device’s firmware version.

Cisco Meraki MX67 and MX68 use the device’s serial number as default credentials to login to the Local Status Page. An assailant may have the ability to utilize this vulnerability to obtain a gadget’s serial number. If the default credentials have actually NOT been altered on the device, the opponent might have the ability to utilize this identification number to login to the device and obtain further information or alter the device’s configuration.

KEEP IN MIND: exploiting this vulnerability does NOT offer an aggressor with the Meraki Dashboard password.


Cisco Meraki strongly suggests that affected customers alter all passwords and tricks entered for the MX gadgets for function usages. This does not suggest that customers need to alter their passwords to log into Dashboard, but rather any qualifications participated in Dashboard that are needed to utilize specific features such as Site-to-Site VPN or Active Directory integrations. This step is suggested for all impacted clients to ensure that the passwords and secrets in use do not have the prospective to be compromised.

Cisco Meraki has released new steady firmware across all impacted platforms with fixes for this vulnerability and suggests consumers set up a firmware upgrade to a fixed release at their earliest benefit. Further details are available in the changelog firmware notes for each impacted item, which can be found in the Meraki Dashboard.

Clients unable to perform an immediate upgrade the firmware on their affected devices can momentarily disable the Local Status Page to secure their devices until all affected devices have actually been upgraded to a repaired software application release. A document explaining the problem in additional information for referral.