Vulnerabilites related to cisco - rv260w_firmware
cve-2022-20841
Vulnerability from cvelistv5
Published
2022-08-10 08:10
Modified
2024-11-01 18:55
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.955Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220803 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20841", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-01T18:42:24.419568Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-01T18:55:49.093Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-08-03T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "CWE-120", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-10T08:10:10", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220803 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR", }, ], source: { advisory: "cisco-sa-sb-mult-vuln-CbVp4SUR", defect: [ [ "CSCwb58268", "CSCwb58273", "CSCwb98961", "CSCwb98964", "CSCwc00210", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business RV Series Routers Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-08-03T23:00:00", ID: "CVE-2022-20841", STATE: "PUBLIC", TITLE: "Cisco Small Business RV Series Routers Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "9.8", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-120", }, ], }, ], }, references: { reference_data: [ { name: "20220803 Cisco Small Business RV Series Routers Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR", }, ], }, source: { advisory: "cisco-sa-sb-mult-vuln-CbVp4SUR", defect: [ [ "CSCwb58268", "CSCwb58273", "CSCwb98961", "CSCwb98964", "CSCwc00210", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20841", datePublished: "2022-08-10T08:10:10.436095Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-01T18:55:49.093Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1251
Vulnerability from cvelistv5
Published
2021-04-08 04:05
Modified
2024-11-08 23:29
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:02:56.381Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210407 Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1251", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:47:00.571527Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-08T23:29:59.228Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-04-07T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-08T04:05:20", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210407 Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, ], source: { advisory: "cisco-sa-rv-multi-lldp-u7e4chCe", defect: [ [ "CSCvw62392", "CSCvw62395", "CSCvw62410", "CSCvw62411", "CSCvw62413", "CSCvw62416", "CSCvw62417", "CSCvw62418", "CSCvw94339", "CSCvw94341", "CSCvw95016", "CSCvw95017", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-04-07T16:00:00", ID: "CVE-2021-1251", STATE: "PUBLIC", TITLE: "Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "20210407 Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, ], }, source: { advisory: "cisco-sa-rv-multi-lldp-u7e4chCe", defect: [ [ "CSCvw62392", "CSCvw62395", "CSCvw62410", "CSCvw62411", "CSCvw62413", "CSCvw62416", "CSCvw62417", "CSCvw62418", "CSCvw94339", "CSCvw94341", "CSCvw95016", "CSCvw95017", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1251", datePublished: "2021-04-08T04:05:20.167064Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-08T23:29:59.228Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1472
Vulnerability from cvelistv5
Published
2021-04-08 04:06
Modified
2024-11-08 17:50
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx | vendor-advisory, x_refsource_CISCO | |
http://seclists.org/fulldisclosure/2021/Apr/39 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:11:17.362Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210407 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx", }, { name: "20210419 [CVE-2021-1472/CVE-2021-1473] Cisco RV Series Authentication Bypass and Remote Command Execution", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2021/Apr/39", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1472", options: [ { Exploitation: "poc", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T17:50:19.661599Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-08T17:50:36.030Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-04-07T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-20T17:06:24", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210407 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx", }, { name: "20210419 [CVE-2021-1472/CVE-2021-1473] Cisco RV Series Authentication Bypass and Remote Command Execution", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2021/Apr/39", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html", }, ], source: { advisory: "cisco-sa-sb-rv-bypass-inject-Rbhgvfdx", defect: [ [ "CSCvw92538", "CSCvw92718", "CSCvw92723", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business RV Series Routers Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-04-07T16:00:00", ID: "CVE-2021-1472", STATE: "PUBLIC", TITLE: "Cisco Small Business RV Series Routers Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "7.3", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "20210407 Cisco Small Business RV Series Routers Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx", }, { name: "20210419 [CVE-2021-1472/CVE-2021-1473] Cisco RV Series Authentication Bypass and Remote Command Execution", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2021/Apr/39", }, { name: "http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html", }, ], }, source: { advisory: "cisco-sa-sb-rv-bypass-inject-Rbhgvfdx", defect: [ [ "CSCvw92538", "CSCvw92718", "CSCvw92723", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1472", datePublished: "2021-04-08T04:06:54.455590Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-08T17:50:36.030Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20703
Vulnerability from cvelistv5
Published
2022-02-10 17:06
Modified
2024-10-29 16:17
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | vendor-advisory, x_refsource_CISCO | |
https://www.zerodayinitiative.com/advisories/ZDI-22-408/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-413/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:48.587Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-408/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-413/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20703", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-29T16:16:49.671765Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-03-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-20703", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-10-29T16:17:26.604Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-02-03T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for several of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-121", description: "CWE-121", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-22T22:06:30", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { tags: [ "x_refsource_MISC", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-408/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-413/", }, ], source: { advisory: "cisco-sa-smb-mult-vuln-KA9PK6D", defect: [ [ "CSCvz88279", "CSCvz94704", "CSCwa12732", "CSCwa12748", "CSCwa12836", "CSCwa13115", "CSCwa13119", "CSCwa13205", "CSCwa13682", "CSCwa13836", "CSCwa13882", "CSCwa13888", "CSCwa13900", "CSCwa14007", "CSCwa14008", "CSCwa14564", "CSCwa14565", "CSCwa14601", "CSCwa14602", "CSCwa15167", "CSCwa15168", "CSCwa18769", "CSCwa18770", "CSCwa32432", "CSCwa36774", "CSCwa54598", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business RV Series Routers Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-02-03T00:00:00", ID: "CVE-2022-20703", STATE: "PUBLIC", TITLE: "Cisco Small Business RV Series Routers Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for several of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "10.0", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-121", }, ], }, ], }, references: { reference_data: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-22-408/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-22-408/", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-22-413/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-22-413/", }, ], }, source: { advisory: "cisco-sa-smb-mult-vuln-KA9PK6D", defect: [ [ "CSCvz88279", "CSCvz94704", "CSCwa12732", "CSCwa12748", "CSCwa12836", "CSCwa13115", "CSCwa13119", "CSCwa13205", "CSCwa13682", "CSCwa13836", "CSCwa13882", "CSCwa13888", "CSCwa13900", "CSCwa14007", "CSCwa14008", "CSCwa14564", "CSCwa14565", "CSCwa14601", "CSCwa14602", "CSCwa15167", "CSCwa15168", "CSCwa18769", "CSCwa18770", "CSCwa32432", "CSCwa36774", "CSCwa54598", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20703", datePublished: "2022-02-10T17:06:30.949451Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-10-29T16:17:26.604Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20706
Vulnerability from cvelistv5
Published
2022-02-10 17:06
Modified
2024-11-06 16:31
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | vendor-advisory, x_refsource_CISCO | |
https://www.zerodayinitiative.com/advisories/ZDI-22-418/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:48.575Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-418/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20706", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-06T16:03:01.010339Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-06T16:31:19.816Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-02-03T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for several of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-121", description: "CWE-121", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-22T22:06:52", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { tags: [ "x_refsource_MISC", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-418/", }, ], source: { advisory: "cisco-sa-smb-mult-vuln-KA9PK6D", defect: [ [ "CSCvz88279", "CSCvz94704", "CSCwa12732", "CSCwa12748", "CSCwa12836", "CSCwa13115", "CSCwa13119", "CSCwa13205", "CSCwa13682", "CSCwa13836", "CSCwa13882", "CSCwa13888", "CSCwa13900", "CSCwa14007", "CSCwa14008", "CSCwa14564", "CSCwa14565", "CSCwa14601", "CSCwa14602", "CSCwa15167", "CSCwa15168", "CSCwa18769", "CSCwa18770", "CSCwa32432", "CSCwa36774", "CSCwa54598", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business RV Series Routers Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-02-03T00:00:00", ID: "CVE-2022-20706", STATE: "PUBLIC", TITLE: "Cisco Small Business RV Series Routers Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for several of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "10.0", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-121", }, ], }, ], }, references: { reference_data: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-22-418/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-22-418/", }, ], }, source: { advisory: "cisco-sa-smb-mult-vuln-KA9PK6D", defect: [ [ "CSCvz88279", "CSCvz94704", "CSCwa12732", "CSCwa12748", "CSCwa12836", "CSCwa13115", "CSCwa13119", "CSCwa13205", "CSCwa13682", "CSCwa13836", "CSCwa13882", "CSCwa13888", "CSCwa13900", "CSCwa14007", "CSCwa14008", "CSCwa14564", "CSCwa14565", "CSCwa14601", "CSCwa14602", "CSCwa15167", "CSCwa15168", "CSCwa18769", "CSCwa18770", "CSCwa32432", "CSCwa36774", "CSCwa54598", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20706", datePublished: "2022-02-10T17:06:28.717476Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-06T16:31:19.816Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1308
Vulnerability from cvelistv5
Published
2021-04-08 04:05
Modified
2024-11-08 23:29
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:02:56.452Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210407 Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1308", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:46:54.264964Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-08T23:29:49.703Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-04-07T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-08T04:05:26", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210407 Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, ], source: { advisory: "cisco-sa-rv-multi-lldp-u7e4chCe", defect: [ [ "CSCvw62392", "CSCvw62395", "CSCvw62410", "CSCvw62411", "CSCvw62413", "CSCvw62416", "CSCvw62417", "CSCvw62418", "CSCvw94339", "CSCvw94341", "CSCvw95016", "CSCvw95017", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-04-07T16:00:00", ID: "CVE-2021-1308", STATE: "PUBLIC", TITLE: "Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "20210407 Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, ], }, source: { advisory: "cisco-sa-rv-multi-lldp-u7e4chCe", defect: [ [ "CSCvw62392", "CSCvw62395", "CSCvw62410", "CSCvw62411", "CSCvw62413", "CSCvw62416", "CSCvw62417", "CSCvw62418", "CSCvw94339", "CSCvw94341", "CSCvw95016", "CSCvw95017", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1308", datePublished: "2021-04-08T04:05:26.191723Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-08T23:29:49.703Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20705
Vulnerability from cvelistv5
Published
2022-02-10 17:06
Modified
2024-11-06 16:31
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:48.597Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { tags: [ "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-415/", }, { tags: [ "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-409/", }, { tags: [ "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-410/", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20705", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-06T16:02:59.984683Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-06T16:31:11.448Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-02-03T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for several of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-121", description: "CWE-121", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-14T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { url: "https://www.zerodayinitiative.com/advisories/ZDI-22-415/", }, { url: "https://www.zerodayinitiative.com/advisories/ZDI-22-409/", }, { url: "https://www.zerodayinitiative.com/advisories/ZDI-22-410/", }, { url: "http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html", }, ], source: { advisory: "cisco-sa-smb-mult-vuln-KA9PK6D", defect: [ [ "CSCvz88279", "CSCvz94704", "CSCwa12732", "CSCwa12748", "CSCwa12836", "CSCwa13115", "CSCwa13119", "CSCwa13205", "CSCwa13682", "CSCwa13836", "CSCwa13882", "CSCwa13888", "CSCwa13900", "CSCwa14007", "CSCwa14008", "CSCwa14564", "CSCwa14565", "CSCwa14601", "CSCwa14602", "CSCwa15167", "CSCwa15168", "CSCwa18769", "CSCwa18770", "CSCwa32432", "CSCwa36774", "CSCwa54598", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business RV Series Routers Vulnerabilities", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20705", datePublished: "2022-02-10T17:06:29.404914Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-06T16:31:11.448Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20702
Vulnerability from cvelistv5
Published
2022-02-10 17:06
Modified
2024-11-06 16:30
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | vendor-advisory, x_refsource_CISCO | |
https://www.zerodayinitiative.com/advisories/ZDI-22-420/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:48.598Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-420/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20702", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-06T16:02:58.165376Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-06T16:30:53.191Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-02-03T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for several of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-121", description: "CWE-121", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-22T22:06:25", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { tags: [ "x_refsource_MISC", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-420/", }, ], source: { advisory: "cisco-sa-smb-mult-vuln-KA9PK6D", defect: [ [ "CSCvz88279", "CSCvz94704", "CSCwa12732", "CSCwa12748", "CSCwa12836", "CSCwa13115", "CSCwa13119", "CSCwa13205", "CSCwa13682", "CSCwa13836", "CSCwa13882", "CSCwa13888", "CSCwa13900", "CSCwa14007", "CSCwa14008", "CSCwa14564", "CSCwa14565", "CSCwa14601", "CSCwa14602", "CSCwa15167", "CSCwa15168", "CSCwa18769", "CSCwa18770", "CSCwa32432", "CSCwa36774", "CSCwa54598", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business RV Series Routers Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-02-03T00:00:00", ID: "CVE-2022-20702", STATE: "PUBLIC", TITLE: "Cisco Small Business RV Series Routers Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for several of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "10.0", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-121", }, ], }, ], }, references: { reference_data: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-22-420/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-22-420/", }, ], }, source: { advisory: "cisco-sa-smb-mult-vuln-KA9PK6D", defect: [ [ "CSCvz88279", "CSCvz94704", "CSCwa12732", "CSCwa12748", "CSCwa12836", "CSCwa13115", "CSCwa13119", "CSCwa13205", "CSCwa13682", "CSCwa13836", "CSCwa13882", "CSCwa13888", "CSCwa13900", "CSCwa14007", "CSCwa14008", "CSCwa14564", "CSCwa14565", "CSCwa14601", "CSCwa14602", "CSCwa15167", "CSCwa15168", "CSCwa18769", "CSCwa18770", "CSCwa32432", "CSCwa36774", "CSCwa54598", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20702", datePublished: "2022-02-10T17:06:31.695747Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-06T16:30:53.191Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20704
Vulnerability from cvelistv5
Published
2022-02-10 17:06
Modified
2024-11-06 16:31
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | vendor-advisory, x_refsource_CISCO | |
https://www.zerodayinitiative.com/advisories/ZDI-22-413/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:48.463Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-413/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20704", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-06T16:02:59.086524Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-06T16:31:02.989Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-02-03T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for several of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-121", description: "CWE-121", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-22T22:06:32", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { tags: [ "x_refsource_MISC", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-413/", }, ], source: { advisory: "cisco-sa-smb-mult-vuln-KA9PK6D", defect: [ [ "CSCvz88279", "CSCvz94704", "CSCwa12732", "CSCwa12748", "CSCwa12836", "CSCwa13115", "CSCwa13119", "CSCwa13205", "CSCwa13682", "CSCwa13836", "CSCwa13882", "CSCwa13888", "CSCwa13900", "CSCwa14007", "CSCwa14008", "CSCwa14564", "CSCwa14565", "CSCwa14601", "CSCwa14602", "CSCwa15167", "CSCwa15168", "CSCwa18769", "CSCwa18770", "CSCwa32432", "CSCwa36774", "CSCwa54598", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business RV Series Routers Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-02-03T00:00:00", ID: "CVE-2022-20704", STATE: "PUBLIC", TITLE: "Cisco Small Business RV Series Routers Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for several of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "10.0", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-121", }, ], }, ], }, references: { reference_data: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-22-413/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-22-413/", }, ], }, source: { advisory: "cisco-sa-smb-mult-vuln-KA9PK6D", defect: [ [ "CSCvz88279", "CSCvz94704", "CSCwa12732", "CSCwa12748", "CSCwa12836", "CSCwa13115", "CSCwa13119", "CSCwa13205", "CSCwa13682", "CSCwa13836", "CSCwa13882", "CSCwa13888", "CSCwa13900", "CSCwa14007", "CSCwa14008", "CSCwa14564", "CSCwa14565", "CSCwa14601", "CSCwa14602", "CSCwa15167", "CSCwa15168", "CSCwa18769", "CSCwa18770", "CSCwa32432", "CSCwa36774", "CSCwa54598", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20704", datePublished: "2022-02-10T17:06:30.172497Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-06T16:31:02.989Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20700
Vulnerability from cvelistv5
Published
2022-02-10 17:06
Modified
2024-10-29 16:15
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:48.585Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20700", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-29T16:13:15.108904Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-03-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-20700", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-10-29T16:15:51.234Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-02-03T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for several of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-121", description: "CWE-121", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-10T17:06:33", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, ], source: { advisory: "cisco-sa-smb-mult-vuln-KA9PK6D", defect: [ [ "CSCvz88279", "CSCvz94704", "CSCwa12732", "CSCwa12748", "CSCwa12836", "CSCwa13115", "CSCwa13119", "CSCwa13205", "CSCwa13682", "CSCwa13836", "CSCwa13882", "CSCwa13888", "CSCwa13900", "CSCwa14007", "CSCwa14008", "CSCwa14564", "CSCwa14565", "CSCwa14601", "CSCwa14602", "CSCwa15167", "CSCwa15168", "CSCwa18769", "CSCwa18770", "CSCwa32432", "CSCwa36774", "CSCwa54598", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business RV Series Routers Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-02-03T00:00:00", ID: "CVE-2022-20700", STATE: "PUBLIC", TITLE: "Cisco Small Business RV Series Routers Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is aware that proof-of-concept exploit code is available for several of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "10.0", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-121", }, ], }, ], }, references: { reference_data: [ { name: "20220203 Cisco Small Business RV Series Routers Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, ], }, source: { advisory: "cisco-sa-smb-mult-vuln-KA9PK6D", defect: [ [ "CSCvz88279", "CSCvz94704", "CSCwa12732", "CSCwa12748", "CSCwa12836", "CSCwa13115", "CSCwa13119", "CSCwa13205", "CSCwa13682", "CSCwa13836", "CSCwa13882", "CSCwa13888", "CSCwa13900", "CSCwa14007", "CSCwa14008", "CSCwa14564", "CSCwa14565", "CSCwa14601", "CSCwa14602", "CSCwa15167", "CSCwa15168", "CSCwa18769", "CSCwa18770", "CSCwa32432", "CSCwa36774", "CSCwa54598", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20700", datePublished: "2022-02-10T17:06:33.217509Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-10-29T16:15:51.234Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1309
Vulnerability from cvelistv5
Published
2021-04-08 04:05
Modified
2024-11-08 23:29
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:02:56.418Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210407 Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1309", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T20:46:45.692659Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-08T23:29:40.340Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-04-07T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-119", description: "CWE-119", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-08T04:05:30", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210407 Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, ], source: { advisory: "cisco-sa-rv-multi-lldp-u7e4chCe", defect: [ [ "CSCvw62392", "CSCvw62395", "CSCvw62410", "CSCvw62411", "CSCvw62413", "CSCvw62416", "CSCvw62417", "CSCvw62418", "CSCvw94339", "CSCvw94341", "CSCvw95016", "CSCvw95017", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-04-07T16:00:00", ID: "CVE-2021-1309", STATE: "PUBLIC", TITLE: "Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "8.8", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "20210407 Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, ], }, source: { advisory: "cisco-sa-rv-multi-lldp-u7e4chCe", defect: [ [ "CSCvw62392", "CSCvw62395", "CSCvw62410", "CSCvw62411", "CSCvw62413", "CSCvw62416", "CSCvw62417", "CSCvw62418", "CSCvw94339", "CSCvw94341", "CSCvw95016", "CSCvw95017", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1309", datePublished: "2021-04-08T04:05:30.866624Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-08T23:29:40.340Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20827
Vulnerability from cvelistv5
Published
2022-08-10 08:12
Modified
2024-11-01 18:54
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:50.204Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220803 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20827", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-01T18:42:22.498606Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-01T18:54:50.122Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-08-03T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-120", description: "CWE-120", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-10T08:12:09", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220803 Cisco Small Business RV Series Routers Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR", }, ], source: { advisory: "cisco-sa-sb-mult-vuln-CbVp4SUR", defect: [ [ "CSCwb58268", "CSCwb58273", "CSCwb98961", "CSCwb98964", "CSCwc00210", ], ], discovery: "INTERNAL", }, title: "Cisco Small Business RV Series Routers Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-08-03T23:00:00", ID: "CVE-2022-20827", STATE: "PUBLIC", TITLE: "Cisco Small Business RV Series Routers Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "9.8", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-120", }, ], }, ], }, references: { reference_data: [ { name: "20220803 Cisco Small Business RV Series Routers Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR", }, ], }, source: { advisory: "cisco-sa-sb-mult-vuln-CbVp4SUR", defect: [ [ "CSCwb58268", "CSCwb58273", "CSCwb98961", "CSCwb98964", "CSCwc00210", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20827", datePublished: "2022-08-10T08:12:09.627719Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-01T18:54:50.122Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2022-02-10 18:15
Modified
2024-11-21 06:43
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv340_firmware | * | |
cisco | rv340 | - | |
cisco | rv340w_firmware | * | |
cisco | rv340w | - | |
cisco | rv345_firmware | * | |
cisco | rv345 | - | |
cisco | rv345p_firmware | * | |
cisco | rv345p | - | |
cisco | rv160_firmware | * | |
cisco | rv160 | - | |
cisco | rv160w_firmware | * | |
cisco | rv160w | - | |
cisco | rv260_firmware | * | |
cisco | rv260 | - | |
cisco | rv260p_firmware | * | |
cisco | rv260p | - | |
cisco | rv260w_firmware | * | |
cisco | rv260w | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C925382-A223-4342-83D2-53B3071F9B45", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDD6C848-8EF9-410A-B899-02F0E03EB653", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", matchCriteriaId: "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE4C000C-89AB-4255-8D2B-4520BCB90490", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", matchCriteriaId: "5E91E68B-CBE9-462E-82D4-6F588B8E84E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0EA14E0B-442A-467D-92FF-369AD3A1A294", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", matchCriteriaId: "5120BAB7-FB3A-481E-9ECD-48341846AFBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54D9FCD7-3DB5-413E-B504-8658A2D38EB7", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", matchCriteriaId: "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30C2C2D2-9466-4A3F-A96C-166E32742C6C", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", matchCriteriaId: "2B7E3792-5D0F-4CCC-874D-512059CA8E12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A21C17DD-A010-4744-9E06-DB845C5A1F00", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", matchCriteriaId: "6FFC99C1-954E-408B-8A08-C79941350F05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "428E4FFE-60EA-4BC1-BF13-FE50F5B093C0", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", matchCriteriaId: "A62A6E2F-FA43-4F40-A684-651FEDAC2114", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED00C268-23EB-4743-8EF1-EEA2BE8A7566", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", matchCriteriaId: "95737F9F-1779-4AAB-875E-2CD586A8B780", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, { lang: "es", value: "Múltiples vulnerabilidades en los routers Cisco Small Business RV160, RV260, RV340 y RV345 Series podrían permitir a un atacante realizar cualquiera de las siguientes acciones Ejecutar código arbitrario. Elevar los privilegios. Ejecutar comandos arbitrarios. Omitir las protecciones de autenticación y autorización. Obtener y ejecutar software no firmado. Causar una denegación de servicio (DoS) Para obtener más información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso", }, ], id: "CVE-2022-20705", lastModified: "2024-11-21T06:43:22.260", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-10T18:15:09.307", references: [ { source: "psirt@cisco.com", url: "http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-409/", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-410/", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-415/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-409/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-410/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-415/", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-121", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-02-10 18:15
Modified
2024-11-21 06:43
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
4.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | Vendor Advisory | |
psirt@cisco.com | https://www.zerodayinitiative.com/advisories/ZDI-22-413/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-22-413/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv340_firmware | * | |
cisco | rv340 | - | |
cisco | rv340w_firmware | * | |
cisco | rv340w | - | |
cisco | rv345_firmware | * | |
cisco | rv345 | - | |
cisco | rv345p_firmware | * | |
cisco | rv345p | - | |
cisco | rv160_firmware | * | |
cisco | rv160 | - | |
cisco | rv160w_firmware | * | |
cisco | rv160w | - | |
cisco | rv260_firmware | * | |
cisco | rv260 | - | |
cisco | rv260p_firmware | * | |
cisco | rv260p | - | |
cisco | rv260w_firmware | * | |
cisco | rv260w | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C925382-A223-4342-83D2-53B3071F9B45", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDD6C848-8EF9-410A-B899-02F0E03EB653", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", matchCriteriaId: "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE4C000C-89AB-4255-8D2B-4520BCB90490", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", matchCriteriaId: "5E91E68B-CBE9-462E-82D4-6F588B8E84E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0EA14E0B-442A-467D-92FF-369AD3A1A294", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", matchCriteriaId: "5120BAB7-FB3A-481E-9ECD-48341846AFBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54D9FCD7-3DB5-413E-B504-8658A2D38EB7", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", matchCriteriaId: "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30C2C2D2-9466-4A3F-A96C-166E32742C6C", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", matchCriteriaId: "2B7E3792-5D0F-4CCC-874D-512059CA8E12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A21C17DD-A010-4744-9E06-DB845C5A1F00", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", matchCriteriaId: "6FFC99C1-954E-408B-8A08-C79941350F05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "428E4FFE-60EA-4BC1-BF13-FE50F5B093C0", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", matchCriteriaId: "A62A6E2F-FA43-4F40-A684-651FEDAC2114", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED00C268-23EB-4743-8EF1-EEA2BE8A7566", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", matchCriteriaId: "95737F9F-1779-4AAB-875E-2CD586A8B780", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, { lang: "es", value: "Múltiples vulnerabilidades en los routers Cisco Small Business RV160, RV260, RV340 y RV345 Series podrían permitir a un atacante realizar cualquiera de las siguientes acciones Ejecutar código arbitrario. Elevar los privilegios. Ejecutar comandos arbitrarios. Omitir las protecciones de autenticación y autorización. Obtener y ejecutar software no firmado. Causar una denegación de servicio (DoS) Para obtener más información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso", }, ], id: "CVE-2022-20704", lastModified: "2024-11-21T06:43:22.110", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 2.5, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-10T18:15:09.253", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-413/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-413/", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-121", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-08 04:15
Modified
2024-11-21 05:43
Severity ?
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv132w_firmware | 1.0.1.14 | |
cisco | rv132w_firmware | 1.0.3.20 | |
cisco | rv132w | - | |
cisco | rv134w_firmware | 1.0.1.14 | |
cisco | rv134w_firmware | 1.0.3.20 | |
cisco | rv134w | - | |
cisco | rv160_firmware | 1.0.1.14 | |
cisco | rv160_firmware | 1.0.3.20 | |
cisco | rv160 | - | |
cisco | rv160w_firmware | 1.0.1.14 | |
cisco | rv160w_firmware | 1.0.3.20 | |
cisco | rv160w | - | |
cisco | rv260_firmware | 1.0.1.14 | |
cisco | rv260_firmware | 1.0.3.20 | |
cisco | rv260 | - | |
cisco | rv260p_firmware | 1.0.1.14 | |
cisco | rv260p_firmware | 1.0.3.20 | |
cisco | rv260p | - | |
cisco | rv260w_firmware | 1.0.1.14 | |
cisco | rv260w_firmware | 1.0.3.20 | |
cisco | rv260w | - | |
cisco | rv340_firmware | 1.0.1.14 | |
cisco | rv340_firmware | 1.0.3.20 | |
cisco | rv340 | - | |
cisco | rv340w_firmware | 1.0.1.14 | |
cisco | rv340w_firmware | 1.0.3.20 | |
cisco | rv340w | - | |
cisco | rv345_firmware | 1.0.1.14 | |
cisco | rv345_firmware | 1.0.3.20 | |
cisco | rv345 | - | |
cisco | rv345p_firmware | 1.0.1.14 | |
cisco | rv345p_firmware | 1.0.3.20 | |
cisco | rv345p | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv132w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "F5759C3B-CE24-47A4-8513-A2C24028973E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv132w_firmware:1.0.3.20:*:*:*:*:*:*:*", matchCriteriaId: "0F83DB37-F1B5-4023-B83D-F44823B162F5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv132w:-:*:*:*:*:*:*:*", matchCriteriaId: "8511C48D-9EA6-4521-988C-61E1035BEFA1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv134w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "C1E2F2A9-4118-4778-94AB-C996A6F56F0F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv134w_firmware:1.0.3.20:*:*:*:*:*:*:*", matchCriteriaId: "976288C6-A125-48B2-BE6B-1294F26D46C9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv134w:-:*:*:*:*:*:*:*", matchCriteriaId: "39710CC4-1891-4E4B-AF65-AC2577CC8FFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "BF13C864-9853-453C-B495-6C642DE9CB69", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv160_firmware:1.0.3.20:*:*:*:*:*:*:*", matchCriteriaId: "AAF5FEFC-45A0-4774-88FF-5303626C4C7E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", matchCriteriaId: "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "79A57FFD-BA26-4F6E-B45F-2DF212908843", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv160w_firmware:1.0.3.20:*:*:*:*:*:*:*", matchCriteriaId: "E9A71045-FF96-4344-9638-6BE2EC47B9E3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", matchCriteriaId: "2B7E3792-5D0F-4CCC-874D-512059CA8E12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "EEE01B7F-692D-405D-938D-35E83C62D8F2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260_firmware:1.0.3.20:*:*:*:*:*:*:*", matchCriteriaId: "42AA099C-B8A2-4864-9F1B-E92ED0E89995", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", matchCriteriaId: "6FFC99C1-954E-408B-8A08-C79941350F05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260p_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "CD084D1A-A03D-4854-9727-76C1FBC1A265", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260p_firmware:1.0.3.20:*:*:*:*:*:*:*", matchCriteriaId: "E389365B-EB1B-45CD-9BA6-1019536D27E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", matchCriteriaId: "A62A6E2F-FA43-4F40-A684-651FEDAC2114", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "A5DC3490-6E60-4806-874D-E23572DEAF35", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260w_firmware:1.0.3.20:*:*:*:*:*:*:*", matchCriteriaId: "AA72296B-4505-4DFA-B576-AEF67E5537CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", matchCriteriaId: "95737F9F-1779-4AAB-875E-2CD586A8B780", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "41A8558B-85AC-442A-9E3E-27EC127C5B33", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_firmware:1.0.3.20:*:*:*:*:*:*:*", matchCriteriaId: "1E4B0547-A92A-4AE2-A70C-227D1FA46ED0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "1B8FB0F6-CAE9-481C-9FC7-69CA0660F506", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_firmware:1.0.3.20:*:*:*:*:*:*:*", matchCriteriaId: "216F3BF9-A17B-46C7-9EF6-153D531550A2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", matchCriteriaId: "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "BEA2331F-521F-4987-83A1-6D0D458B41DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_firmware:1.0.3.20:*:*:*:*:*:*:*", matchCriteriaId: "1DDEB88C-8545-4E12-88D8-083EEB868792", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", matchCriteriaId: "5E91E68B-CBE9-462E-82D4-6F588B8E84E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "3E16124B-9448-47A0-A6BF-A95B37446E91", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_firmware:1.0.3.20:*:*:*:*:*:*:*", matchCriteriaId: "66F2D261-E845-4334-838A-62A4FA593FF3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", matchCriteriaId: "5120BAB7-FB3A-481E-9ECD-48341846AFBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).", }, { lang: "es", value: "Múltiples vulnerabilidades en la implementación del Link Layer Discovery Protocol (LLDP) para Enrutadores Cisco Small Business RV Series. Un atacante adyacente no autenticado podría ejecutar código arbitrario o causar que un enrutador afectado filtre la memoria del sistema o se recargue. Una pérdida de memoria o una recarga del dispositivo podrían causar una condición de denegación de servicio (DoS) en un dispositivo afectado. Para mayor información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso. Nota: LLDP es un protocolo de Capa 2. Para explotar estas vulnerabilidades, un atacante debe estar en el mismo dominio de transmisión que el dispositivo afectado (adyacente a Capa 2)", }, ], id: "CVE-2021-1251", lastModified: "2024-11-21T05:43:55.783", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-08T04:15:11.860", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-401", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-08-10 09:15
Modified
2024-11-21 06:43
Severity ?
9.0 (Critical) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv160_firmware | * | |
cisco | rv160 | - | |
cisco | rv160w_firmware | * | |
cisco | rv160w | - | |
cisco | rv260_firmware | * | |
cisco | rv260 | - | |
cisco | rv260p_firmware | * | |
cisco | rv260p | - | |
cisco | rv260w_firmware | * | |
cisco | rv260w | - | |
cisco | rv340_firmware | * | |
cisco | rv340 | - | |
cisco | rv340w_firmware | * | |
cisco | rv340w | - | |
cisco | rv345_firmware | * | |
cisco | rv345 | - | |
cisco | rv345p_firmware | * | |
cisco | rv345p | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC1EBF8C-DC2F-422A-BB5A-8EBA8F68C10D", versionEndExcluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", matchCriteriaId: "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EC2F28CC-7FD9-4CAE-86C5-E86C0874561B", versionEndExcluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", matchCriteriaId: "2B7E3792-5D0F-4CCC-874D-512059CA8E12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2093B7CE-9902-4D0B-BC86-8582DEACF696", versionEndExcluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", matchCriteriaId: "6FFC99C1-954E-408B-8A08-C79941350F05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9B1CF205-B0AB-40C7-BA28-BF458CCC9EAF", versionEndExcluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", matchCriteriaId: "A62A6E2F-FA43-4F40-A684-651FEDAC2114", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E045BFA8-1EED-4793-A2A9-46D4B68BD685", versionEndExcluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", matchCriteriaId: "95737F9F-1779-4AAB-875E-2CD586A8B780", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21586C44-B44A-44DB-81C2-E12A750A7840", versionEndExcluding: "1.0.03.26", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CC3876E6-885E-4AC7-A04F-DF91CEDF0385", versionEndExcluding: "1.0.03.26", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", matchCriteriaId: "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "185E81E5-49D7-49CC-ABCB-C9ECF612A6E2", versionEndExcluding: "1.0.03.26", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", matchCriteriaId: "5E91E68B-CBE9-462E-82D4-6F588B8E84E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3BAA3B86-EE3C-45BD-ACC6-64742DFB71E9", versionEndExcluding: "1.0.03.26", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", matchCriteriaId: "5120BAB7-FB3A-481E-9ECD-48341846AFBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", }, { lang: "es", value: "Varias vulnerabilidades en los routers Cisco Small Business de las series RV160, RV260, RV340 y RV345 podrían permitir a un atacante remoto no autenticado ejecutar código arbitrario o causar una denegación de servicio (DoS) en un dispositivo afectado. Para obtener más información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso", }, ], id: "CVE-2022-20827", lastModified: "2024-11-21T06:43:38.243", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-08-10T09:15:08.537", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-02-10 18:15
Modified
2024-11-21 06:43
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | Vendor Advisory | |
psirt@cisco.com | https://www.zerodayinitiative.com/advisories/ZDI-22-418/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-22-418/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv340_firmware | * | |
cisco | rv340 | - | |
cisco | rv340w_firmware | * | |
cisco | rv340w | - | |
cisco | rv345_firmware | * | |
cisco | rv345 | - | |
cisco | rv345p_firmware | * | |
cisco | rv345p | - | |
cisco | rv160_firmware | * | |
cisco | rv160 | - | |
cisco | rv160w_firmware | * | |
cisco | rv160w | - | |
cisco | rv260_firmware | * | |
cisco | rv260 | - | |
cisco | rv260p_firmware | * | |
cisco | rv260p | - | |
cisco | rv260w_firmware | * | |
cisco | rv260w | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C925382-A223-4342-83D2-53B3071F9B45", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDD6C848-8EF9-410A-B899-02F0E03EB653", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", matchCriteriaId: "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE4C000C-89AB-4255-8D2B-4520BCB90490", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", matchCriteriaId: "5E91E68B-CBE9-462E-82D4-6F588B8E84E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0EA14E0B-442A-467D-92FF-369AD3A1A294", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", matchCriteriaId: "5120BAB7-FB3A-481E-9ECD-48341846AFBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54D9FCD7-3DB5-413E-B504-8658A2D38EB7", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", matchCriteriaId: "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30C2C2D2-9466-4A3F-A96C-166E32742C6C", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", matchCriteriaId: "2B7E3792-5D0F-4CCC-874D-512059CA8E12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A21C17DD-A010-4744-9E06-DB845C5A1F00", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", matchCriteriaId: "6FFC99C1-954E-408B-8A08-C79941350F05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "428E4FFE-60EA-4BC1-BF13-FE50F5B093C0", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", matchCriteriaId: "A62A6E2F-FA43-4F40-A684-651FEDAC2114", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED00C268-23EB-4743-8EF1-EEA2BE8A7566", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", matchCriteriaId: "95737F9F-1779-4AAB-875E-2CD586A8B780", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, { lang: "es", value: "Múltiples vulnerabilidades en los routers Cisco Small Business RV160, RV260, RV340 y RV345 Series podrían permitir a un atacante realizar cualquiera de las siguientes acciones Ejecutar código arbitrario. Elevar los privilegios. Ejecutar comandos arbitrarios. Omitir las protecciones de autenticación y autorización. Obtener y ejecutar software no firmado. Causar una denegación de servicio (DoS) Para obtener más información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso", }, ], id: "CVE-2022-20706", lastModified: "2024-11-21T06:43:22.427", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 9.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-10T18:15:09.360", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-418/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-418/", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-121", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-08 04:15
Modified
2024-11-21 05:44
Severity ?
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv132w_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "8C12141B-531E-44A5-AD79-16504B31D384", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv132w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "F5759C3B-CE24-47A4-8513-A2C24028973E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv132w_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "5CB50517-FD1B-4207-B63B-4E33F7654E2E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv132w:-:*:*:*:*:*:*:*", matchCriteriaId: "8511C48D-9EA6-4521-988C-61E1035BEFA1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv134w_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "2835C440-025B-414F-BED1-5DA20431E726", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv134w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "C1E2F2A9-4118-4778-94AB-C996A6F56F0F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv134w_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "62CC81E5-DA22-47A1-9D02-00A86DED8D96", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv134w:-:*:*:*:*:*:*:*", matchCriteriaId: "39710CC4-1891-4E4B-AF65-AC2577CC8FFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "BAA1FCAC-F214-46F5-B2D7-751B24865236", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv160_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "BF13C864-9853-453C-B495-6C642DE9CB69", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv160_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "DA85E0EA-C194-4683-BA09-7C68080924E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", matchCriteriaId: "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160w_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "F75F5D34-CED9-4390-AC75-7F592175DD67", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv160w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "79A57FFD-BA26-4F6E-B45F-2DF212908843", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv160w_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "95130A28-C573-4BDF-ABDB-45EE96E94406", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", matchCriteriaId: "2B7E3792-5D0F-4CCC-874D-512059CA8E12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "9AA93AAF-F894-44AE-98D6-DBF868AC4EBB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "EEE01B7F-692D-405D-938D-35E83C62D8F2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "FEA38FA6-CACA-4553-853C-E36D6395C3E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", matchCriteriaId: "6FFC99C1-954E-408B-8A08-C79941350F05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260p_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "9A035A4A-B82A-4F0B-8D38-4DD280037C11", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260p_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "CD084D1A-A03D-4854-9727-76C1FBC1A265", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260p_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "BDA8B5D4-821E-48CB-81EA-943BD1039087", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", matchCriteriaId: "A62A6E2F-FA43-4F40-A684-651FEDAC2114", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260w_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "F84DC383-4F05-4294-9008-B5223353526D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "A5DC3490-6E60-4806-874D-E23572DEAF35", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260w_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "9FED3BFB-7AA7-4A49-B911-58D7CBE8D704", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", matchCriteriaId: "95737F9F-1779-4AAB-875E-2CD586A8B780", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "EFC9C7EC-388E-476D-A444-EE9BEE3FD578", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "41A8558B-85AC-442A-9E3E-27EC127C5B33", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "DD473F62-964C-4D15-B0B6-D9D4AB8E2C1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "4165E6FA-C876-45B4-B48A-7B1D51A028BA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "1B8FB0F6-CAE9-481C-9FC7-69CA0660F506", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "35729306-0CFF-4ACD-B77D-172A92FD67DF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", matchCriteriaId: "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "784C42BE-E7CD-45F0-8209-436F54812C1D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "BEA2331F-521F-4987-83A1-6D0D458B41DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "90F3DC42-58C9-4BC4-AFCC-077C0BDAAB2E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", matchCriteriaId: "5E91E68B-CBE9-462E-82D4-6F588B8E84E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "5FB2292D-20C8-4929-9802-7FC770952200", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "3E16124B-9448-47A0-A6BF-A95B37446E91", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "948587E0-67B8-4A80-AFAA-96A22F522F42", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", matchCriteriaId: "5120BAB7-FB3A-481E-9ECD-48341846AFBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).", }, { lang: "es", value: "Múltiples vulnerabilidades en la implementación del Link Layer Discovery Protocol (LLDP) para Enrutadores Cisco Small Business RV Series. Un atacante adyacente no autenticado podría ejecutar código arbitrario o hacer que un enrutador afectado filtre la memoria del sistema o se recargue. Una pérdida de memoria o la recarga del dispositivo podrían causar una condición de denegación de servicio (DoS) en un dispositivo afectado. Para mayor información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso. Nota: LLDP es un protocolo de Capa 2. Para explotar estas vulnerabilidades, un atacante debe estar en el mismo dominio de transmisión que el dispositivo afectado (adyacente a Capa 2)", }, ], id: "CVE-2021-1308", lastModified: "2024-11-21T05:44:03.550", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-08T04:15:11.983", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-401", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-02-10 18:15
Modified
2025-03-13 19:56
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
8.0 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.0 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | Vendor Advisory | |
psirt@cisco.com | https://www.zerodayinitiative.com/advisories/ZDI-22-408/ | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://www.zerodayinitiative.com/advisories/ZDI-22-413/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-22-408/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-22-413/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv340_firmware | * | |
cisco | rv340 | - | |
cisco | rv340w_firmware | * | |
cisco | rv340w | - | |
cisco | rv345_firmware | * | |
cisco | rv345 | - | |
cisco | rv345p_firmware | * | |
cisco | rv345p | - | |
cisco | rv160_firmware | * | |
cisco | rv160 | - | |
cisco | rv160w_firmware | * | |
cisco | rv160w | - | |
cisco | rv260_firmware | * | |
cisco | rv260 | - | |
cisco | rv260p_firmware | * | |
cisco | rv260p | - | |
cisco | rv260w_firmware | * | |
cisco | rv260w | - |
{ cisaActionDue: "2022-03-17", cisaExploitAdd: "2022-03-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C925382-A223-4342-83D2-53B3071F9B45", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDD6C848-8EF9-410A-B899-02F0E03EB653", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", matchCriteriaId: "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE4C000C-89AB-4255-8D2B-4520BCB90490", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", matchCriteriaId: "5E91E68B-CBE9-462E-82D4-6F588B8E84E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0EA14E0B-442A-467D-92FF-369AD3A1A294", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", matchCriteriaId: "5120BAB7-FB3A-481E-9ECD-48341846AFBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54D9FCD7-3DB5-413E-B504-8658A2D38EB7", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", matchCriteriaId: "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30C2C2D2-9466-4A3F-A96C-166E32742C6C", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", matchCriteriaId: "2B7E3792-5D0F-4CCC-874D-512059CA8E12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A21C17DD-A010-4744-9E06-DB845C5A1F00", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", matchCriteriaId: "6FFC99C1-954E-408B-8A08-C79941350F05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "428E4FFE-60EA-4BC1-BF13-FE50F5B093C0", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", matchCriteriaId: "A62A6E2F-FA43-4F40-A684-651FEDAC2114", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED00C268-23EB-4743-8EF1-EEA2BE8A7566", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", matchCriteriaId: "95737F9F-1779-4AAB-875E-2CD586A8B780", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, { lang: "es", value: "Múltiples vulnerabilidades en los routers Cisco Small Business RV160, RV260, RV340 y RV345 Series podrían permitir a un atacante realizar cualquiera de las siguientes acciones Ejecutar código arbitrario. Elevar los privilegios. Ejecutar comandos arbitrarios. Omitir las protecciones de autenticación y autorización. Obtener y ejecutar software no firmado. Causar una denegación de servicio (DoS) Para obtener más información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso", }, ], id: "CVE-2022-20703", lastModified: "2025-03-13T19:56:33.363", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-10T18:15:09.197", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-408/", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-413/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-408/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-413/", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-121", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-295", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-08 04:15
Modified
2024-11-21 05:44
Severity ?
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv132w_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "8C12141B-531E-44A5-AD79-16504B31D384", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv132w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "F5759C3B-CE24-47A4-8513-A2C24028973E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv132w_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "5CB50517-FD1B-4207-B63B-4E33F7654E2E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv132w:-:*:*:*:*:*:*:*", matchCriteriaId: "8511C48D-9EA6-4521-988C-61E1035BEFA1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv134w_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "2835C440-025B-414F-BED1-5DA20431E726", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv134w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "C1E2F2A9-4118-4778-94AB-C996A6F56F0F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv134w_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "62CC81E5-DA22-47A1-9D02-00A86DED8D96", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv134w:-:*:*:*:*:*:*:*", matchCriteriaId: "39710CC4-1891-4E4B-AF65-AC2577CC8FFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "BAA1FCAC-F214-46F5-B2D7-751B24865236", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv160_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "BF13C864-9853-453C-B495-6C642DE9CB69", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv160_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "DA85E0EA-C194-4683-BA09-7C68080924E0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", matchCriteriaId: "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160w_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "F75F5D34-CED9-4390-AC75-7F592175DD67", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv160w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "79A57FFD-BA26-4F6E-B45F-2DF212908843", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv160w_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "95130A28-C573-4BDF-ABDB-45EE96E94406", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", matchCriteriaId: "2B7E3792-5D0F-4CCC-874D-512059CA8E12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "9AA93AAF-F894-44AE-98D6-DBF868AC4EBB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "EEE01B7F-692D-405D-938D-35E83C62D8F2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "FEA38FA6-CACA-4553-853C-E36D6395C3E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", matchCriteriaId: "6FFC99C1-954E-408B-8A08-C79941350F05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260p_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "9A035A4A-B82A-4F0B-8D38-4DD280037C11", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260p_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "CD084D1A-A03D-4854-9727-76C1FBC1A265", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260p_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "BDA8B5D4-821E-48CB-81EA-943BD1039087", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", matchCriteriaId: "A62A6E2F-FA43-4F40-A684-651FEDAC2114", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260w_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "F84DC383-4F05-4294-9008-B5223353526D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "A5DC3490-6E60-4806-874D-E23572DEAF35", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv260w_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "9FED3BFB-7AA7-4A49-B911-58D7CBE8D704", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", matchCriteriaId: "95737F9F-1779-4AAB-875E-2CD586A8B780", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "EFC9C7EC-388E-476D-A444-EE9BEE3FD578", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "41A8558B-85AC-442A-9E3E-27EC127C5B33", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "DD473F62-964C-4D15-B0B6-D9D4AB8E2C1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "4165E6FA-C876-45B4-B48A-7B1D51A028BA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "1B8FB0F6-CAE9-481C-9FC7-69CA0660F506", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "35729306-0CFF-4ACD-B77D-172A92FD67DF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", matchCriteriaId: "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "784C42BE-E7CD-45F0-8209-436F54812C1D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "BEA2331F-521F-4987-83A1-6D0D458B41DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "90F3DC42-58C9-4BC4-AFCC-077C0BDAAB2E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", matchCriteriaId: "5E91E68B-CBE9-462E-82D4-6F588B8E84E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_firmware:1.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "5FB2292D-20C8-4929-9802-7FC770952200", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_firmware:1.0.1.14:*:*:*:*:*:*:*", matchCriteriaId: "3E16124B-9448-47A0-A6BF-A95B37446E91", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_firmware:1.0.1.20:*:*:*:*:*:*:*", matchCriteriaId: "948587E0-67B8-4A80-AFAA-96A22F522F42", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", matchCriteriaId: "5120BAB7-FB3A-481E-9ECD-48341846AFBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).", }, { lang: "es", value: "Múltiples vulnerabilidades en la implementación del Link Layer Discovery Protocol (LLDP) para Enrutadores Cisco Small Business RV Series. Un atacante adyacente no autenticado podría ejecutar código arbitrario o causar que un enrutador afectado filtre la memoria del sistema o se recargue. Una pérdida de memoria o una recarga del dispositivo podrían causar una condición de denegación de servicio (DoS) en un dispositivo afectado. Para mayor información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso. Nota: LLDP es un protocolo de capa 2. Para explotar estas vulnerabilidades, un atacante debe estar en el mismo dominio de transmisión que el dispositivo afectado (adyacente a Capa 2)", }, ], id: "CVE-2021-1309", lastModified: "2024-11-21T05:44:03.693", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:A/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-08T04:15:12.063", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-401", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-08-10 08:15
Modified
2024-11-21 06:43
Severity ?
9.0 (Critical) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
9.0 (Critical) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
9.0 (Critical) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv160_firmware | * | |
cisco | rv160 | - | |
cisco | rv160w_firmware | * | |
cisco | rv160w | - | |
cisco | rv260_firmware | * | |
cisco | rv260 | - | |
cisco | rv260p_firmware | * | |
cisco | rv260p | - | |
cisco | rv260w_firmware | * | |
cisco | rv260w | - | |
cisco | rv340_firmware | * | |
cisco | rv340 | - | |
cisco | rv340w_firmware | * | |
cisco | rv340w | - | |
cisco | rv345_firmware | * | |
cisco | rv345 | - | |
cisco | rv345p_firmware | * | |
cisco | rv345p | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC1EBF8C-DC2F-422A-BB5A-8EBA8F68C10D", versionEndExcluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", matchCriteriaId: "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EC2F28CC-7FD9-4CAE-86C5-E86C0874561B", versionEndExcluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", matchCriteriaId: "2B7E3792-5D0F-4CCC-874D-512059CA8E12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2093B7CE-9902-4D0B-BC86-8582DEACF696", versionEndExcluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", matchCriteriaId: "6FFC99C1-954E-408B-8A08-C79941350F05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9B1CF205-B0AB-40C7-BA28-BF458CCC9EAF", versionEndExcluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", matchCriteriaId: "A62A6E2F-FA43-4F40-A684-651FEDAC2114", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E045BFA8-1EED-4793-A2A9-46D4B68BD685", versionEndExcluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", matchCriteriaId: "95737F9F-1779-4AAB-875E-2CD586A8B780", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21586C44-B44A-44DB-81C2-E12A750A7840", versionEndExcluding: "1.0.03.26", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CC3876E6-885E-4AC7-A04F-DF91CEDF0385", versionEndExcluding: "1.0.03.26", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", matchCriteriaId: "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "185E81E5-49D7-49CC-ABCB-C9ECF612A6E2", versionEndExcluding: "1.0.03.26", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", matchCriteriaId: "5E91E68B-CBE9-462E-82D4-6F588B8E84E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3BAA3B86-EE3C-45BD-ACC6-64742DFB71E9", versionEndExcluding: "1.0.03.26", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", matchCriteriaId: "5120BAB7-FB3A-481E-9ECD-48341846AFBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", }, { lang: "es", value: "Múltiples vulnerabilidades en los routers Cisco Small Business de las series RV160, RV260, RV340 y RV345 podrían permitir a un atacante remoto no autenticado ejecutar código arbitrario o causar una condición de denegación de servicio (DoS) en un dispositivo afectado. Para obtener más información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso", }, ], id: "CVE-2022-20841", lastModified: "2024-11-21T06:43:39.987", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-08-10T08:15:07.317", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-mult-vuln-CbVp4SUR", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-120", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-08 04:15
Modified
2024-11-21 05:44
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html | Exploit, Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://seclists.org/fulldisclosure/2021/Apr/39 | Mailing List, Third Party Advisory | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/Apr/39 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv160_firmware | * | |
cisco | rv160 | - | |
cisco | rv160w_firmware | * | |
cisco | rv160w | - | |
cisco | rv260_firmware | * | |
cisco | rv260 | - | |
cisco | rv260p_firmware | * | |
cisco | rv260p | - | |
cisco | rv260w_firmware | * | |
cisco | rv260w | - | |
cisco | rv340_firmware | * | |
cisco | rv340 | - | |
cisco | rv340w_firmware | * | |
cisco | rv340w | - | |
cisco | rv345_firmware | * | |
cisco | rv345 | - | |
cisco | rv345p_firmware | * | |
cisco | rv345p | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BA1708A1-3D6B-4257-B32B-25A595EAB3B4", versionEndExcluding: "1.0.01.03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", matchCriteriaId: "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "22C0BE4B-1145-4497-8E4D-8901281C4A4B", versionEndExcluding: "1.0.01.03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", matchCriteriaId: "2B7E3792-5D0F-4CCC-874D-512059CA8E12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "297BBB67-862F-4640-89A1-247B6BC51F37", versionEndExcluding: "1.0.01.03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", matchCriteriaId: "6FFC99C1-954E-408B-8A08-C79941350F05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7158A7E3-1C93-46FA-B5BC-47A3049F0641", versionEndExcluding: "1.0.01.03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", matchCriteriaId: "A62A6E2F-FA43-4F40-A684-651FEDAC2114", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A2B47064-2877-44C8-BC28-F1678A5F9566", versionEndExcluding: "1.0.01.03", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", matchCriteriaId: "95737F9F-1779-4AAB-875E-2CD586A8B780", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB20DECC-5D66-4E87-8E19-AFCE0EC2538B", versionEndExcluding: "1.0.03.21", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F1D3E083-7BC2-485B-82CD-CE3DE176A047", versionEndExcluding: "1.0.03.21", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", matchCriteriaId: "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "504FBEF9-DCC1-4EE2-9F04-14E38141A03C", versionEndExcluding: "1.0.03.21", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", matchCriteriaId: "5E91E68B-CBE9-462E-82D4-6F588B8E84E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C7C3346-DD1A-41CC-BB4D-F42CCE75A928", versionEndExcluding: "1.0.03.21", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", matchCriteriaId: "5120BAB7-FB3A-481E-9ECD-48341846AFBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", }, { lang: "es", value: "Se presentan múltiples vulnerabilidades en la interfaz de administración basada en web de los enrutadores Cisco Small Business RV Series. Un atacante remoto podría ejecutar comandos arbitrarios u omitir la autenticación y cargar archivos en un dispositivo afectado. Para mayor información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso", }, ], id: "CVE-2021-1472", lastModified: "2024-11-21T05:44:26.040", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-08T04:15:13.687", references: [ { source: "psirt@cisco.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html", }, { source: "psirt@cisco.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2021/Apr/39", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/162238/Cisco-RV-Authentication-Bypass-Code-Execution.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2021/Apr/39", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-02-10 18:15
Modified
2025-03-13 19:56
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv340_firmware | * | |
cisco | rv340 | - | |
cisco | rv340w_firmware | * | |
cisco | rv340w | - | |
cisco | rv345_firmware | * | |
cisco | rv345 | - | |
cisco | rv345p_firmware | * | |
cisco | rv345p | - | |
cisco | rv160_firmware | * | |
cisco | rv160 | - | |
cisco | rv160w_firmware | * | |
cisco | rv160w | - | |
cisco | rv260_firmware | * | |
cisco | rv260 | - | |
cisco | rv260p_firmware | * | |
cisco | rv260p | - | |
cisco | rv260w_firmware | * | |
cisco | rv260w | - |
{ cisaActionDue: "2022-03-17", cisaExploitAdd: "2022-03-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C925382-A223-4342-83D2-53B3071F9B45", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDD6C848-8EF9-410A-B899-02F0E03EB653", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", matchCriteriaId: "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE4C000C-89AB-4255-8D2B-4520BCB90490", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", matchCriteriaId: "5E91E68B-CBE9-462E-82D4-6F588B8E84E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0EA14E0B-442A-467D-92FF-369AD3A1A294", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", matchCriteriaId: "5120BAB7-FB3A-481E-9ECD-48341846AFBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54D9FCD7-3DB5-413E-B504-8658A2D38EB7", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", matchCriteriaId: "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30C2C2D2-9466-4A3F-A96C-166E32742C6C", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", matchCriteriaId: "2B7E3792-5D0F-4CCC-874D-512059CA8E12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A21C17DD-A010-4744-9E06-DB845C5A1F00", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", matchCriteriaId: "6FFC99C1-954E-408B-8A08-C79941350F05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "428E4FFE-60EA-4BC1-BF13-FE50F5B093C0", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", matchCriteriaId: "A62A6E2F-FA43-4F40-A684-651FEDAC2114", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED00C268-23EB-4743-8EF1-EEA2BE8A7566", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", matchCriteriaId: "95737F9F-1779-4AAB-875E-2CD586A8B780", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, { lang: "es", value: "Múltiples vulnerabilidades en los routers Cisco Small Business RV160, RV260, RV340 y RV345 Series podrían permitir a un atacante realizar cualquiera de las siguientes acciones Ejecutar código arbitrario. Elevar los privilegios. Ejecutar comandos arbitrarios. Omitir las protecciones de autenticación y autorización. Obtener y ejecutar software no firmado. Causar una denegación de servicio (DoS) Para obtener más información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso", }, ], id: "CVE-2022-20700", lastModified: "2025-03-13T19:56:23.477", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-10T18:15:09.033", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-121", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-02-10 18:15
Modified
2024-11-21 06:43
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | Vendor Advisory | |
psirt@cisco.com | https://www.zerodayinitiative.com/advisories/ZDI-22-420/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-22-420/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv340_firmware | * | |
cisco | rv340 | - | |
cisco | rv340w_firmware | * | |
cisco | rv340w | - | |
cisco | rv345_firmware | * | |
cisco | rv345 | - | |
cisco | rv345p_firmware | * | |
cisco | rv345p | - | |
cisco | rv160_firmware | * | |
cisco | rv160 | - | |
cisco | rv160w_firmware | * | |
cisco | rv160w | - | |
cisco | rv260_firmware | * | |
cisco | rv260 | - | |
cisco | rv260p_firmware | * | |
cisco | rv260p | - | |
cisco | rv260w_firmware | * | |
cisco | rv260w | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C925382-A223-4342-83D2-53B3071F9B45", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", matchCriteriaId: "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DDD6C848-8EF9-410A-B899-02F0E03EB653", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", matchCriteriaId: "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE4C000C-89AB-4255-8D2B-4520BCB90490", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", matchCriteriaId: "5E91E68B-CBE9-462E-82D4-6F588B8E84E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0EA14E0B-442A-467D-92FF-369AD3A1A294", versionEndIncluding: "1.0.03.24", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", matchCriteriaId: "5120BAB7-FB3A-481E-9ECD-48341846AFBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54D9FCD7-3DB5-413E-B504-8658A2D38EB7", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", matchCriteriaId: "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv160w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30C2C2D2-9466-4A3F-A96C-166E32742C6C", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", matchCriteriaId: "2B7E3792-5D0F-4CCC-874D-512059CA8E12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A21C17DD-A010-4744-9E06-DB845C5A1F00", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", matchCriteriaId: "6FFC99C1-954E-408B-8A08-C79941350F05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "428E4FFE-60EA-4BC1-BF13-FE50F5B093C0", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", matchCriteriaId: "A62A6E2F-FA43-4F40-A684-651FEDAC2114", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv260w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ED00C268-23EB-4743-8EF1-EEA2BE8A7566", versionEndIncluding: "1.0.01.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", matchCriteriaId: "95737F9F-1779-4AAB-875E-2CD586A8B780", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", }, { lang: "es", value: "Múltiples vulnerabilidades en los routers Cisco Small Business RV160, RV260, RV340 y RV345 Series podrían permitir a un atacante realizar cualquiera de las siguientes acciones Ejecutar código arbitrario. Elevar los privilegios. Ejecutar comandos arbitrarios. Omitir las protecciones de autenticación y autorización. Obtener y ejecutar software no firmado. Causar una denegación de servicio (DoS) Para obtener más información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso", }, ], id: "CVE-2022-20702", lastModified: "2024-11-21T06:43:21.797", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-10T18:15:09.137", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-420/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-22-420/", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-121", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }