Vulnerabilites related to cisco - rv345p_dual_wan_gigabit_poe_vpn_router_firmware
cve-2020-3357
Vulnerability from cvelistv5
Published
2020-07-16 17:21
Modified
2024-11-15 16:54
Severity ?
EPSS score ?
Summary
A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause the device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because HTTP requests are not properly validated. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device or cause the device to reload, resulting in a DoS condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rce-dos-9ZAjkx4 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:58.150Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200715 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rce-dos-9ZAjkx4", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3357", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:19:31.307662Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T16:54:14.193Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-07-15T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause the device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because HTTP requests are not properly validated. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device or cause the device to reload, resulting in a DoS condition.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-16T17:21:23", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200715 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rce-dos-9ZAjkx4", }, ], source: { advisory: "cisco-sa-sb-rce-dos-9ZAjkx4", defect: [ [ "CSCvu36543", ], ], discovery: "INTERNAL", }, title: "Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-07-15T16:00:00", ID: "CVE-2020-3357", STATE: "PUBLIC", TITLE: "Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause the device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because HTTP requests are not properly validated. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device or cause the device to reload, resulting in a DoS condition.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "9.8", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20200715 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rce-dos-9ZAjkx4", }, ], }, source: { advisory: "cisco-sa-sb-rce-dos-9ZAjkx4", defect: [ [ "CSCvu36543", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3357", datePublished: "2020-07-16T17:21:24.031974Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T16:54:14.193Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3358
Vulnerability from cvelistv5
Published
2020-07-16 17:21
Modified
2024-11-15 16:53
Severity ?
EPSS score ?
Summary
A vulnerability in the Secure Sockets Layer (SSL) VPN feature for Cisco Small Business RV VPN Routers could allow an unauthenticated, remote attacker to cause the device to unexpectedly restart, causing a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to the targeted device. A successful exploit could allow the attacker to cause a reload, resulting in a DoS condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-dos-ZN5GvNH7 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:58.220Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200715 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-dos-ZN5GvNH7", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3358", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-15T16:21:02.200794Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T16:53:59.870Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-07-15T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Secure Sockets Layer (SSL) VPN feature for Cisco Small Business RV VPN Routers could allow an unauthenticated, remote attacker to cause the device to unexpectedly restart, causing a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to the targeted device. A successful exploit could allow the attacker to cause a reload, resulting in a DoS condition.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-07-16T17:21:28", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200715 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-dos-ZN5GvNH7", }, ], source: { advisory: "cisco-sa-sb-dos-ZN5GvNH7", defect: [ [ "CSCvu36544", ], ], discovery: "INTERNAL", }, title: "Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-07-15T16:00:00", ID: "CVE-2020-3358", STATE: "PUBLIC", TITLE: "Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Small Business RV Series Router Firmware", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Secure Sockets Layer (SSL) VPN feature for Cisco Small Business RV VPN Routers could allow an unauthenticated, remote attacker to cause the device to unexpectedly restart, causing a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to the targeted device. A successful exploit could allow the attacker to cause a reload, resulting in a DoS condition.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.6", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20200715 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-dos-ZN5GvNH7", }, ], }, source: { advisory: "cisco-sa-sb-dos-ZN5GvNH7", defect: [ [ "CSCvu36544", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3358", datePublished: "2020-07-16T17:21:28.529068Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-15T16:53:59.870Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20393
Vulnerability from cvelistv5
Published
2024-10-02 16:53
Modified
2024-10-02 19:58
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device.
This vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: 1.0.01.17 Version: 1.0.03.17 Version: 1.0.01.16 Version: 1.0.01.18 Version: 1.0.00.29 Version: 1.0.03.16 Version: 1.0.03.15 Version: 1.0.02.16 Version: 1.0.01.20 Version: 1.0.00.33 Version: 1.0.03.18 Version: 1.0.03.19 Version: 1.0.03.20 Version: 1.0.03.21 Version: 1.0.03.22 Version: 1.0.03.24 Version: 1.0.03.26 Version: 1.0.03.27 Version: 1.0.03.28 Version: 1.0.03.29 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "small_business_rv_series_router_firmware", vendor: "cisco", versions: [ { status: "affected", version: "1.0.01.17", }, { status: "affected", version: "1.0.03.17", }, { status: "affected", version: "1.0.01.16", }, { status: "affected", version: "1.0.01.18", }, { status: "affected", version: "1.0.00.29", }, { status: "affected", version: "1.0.03.16", }, { status: "affected", version: "1.0.03.15", }, { status: "affected", version: "1.0.02.16", }, { status: "affected", version: "1.0.01.20", }, { status: "affected", version: "1.0.00.33", }, { status: "affected", version: "1.0.03.18", }, { status: "affected", version: "1.0.03.19", }, { status: "affected", version: "1.0.03.20", }, { status: "affected", version: "1.0.03.21", }, { status: "affected", version: "1.0.03.22", }, { status: "affected", version: "1.0.03.24", }, { status: "affected", version: "1.0.03.26", }, { status: "affected", version: "1.0.03.27", }, { status: "affected", version: "1.0.03.28", }, { status: "affected", version: "1.0.03.29", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20393", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-02T19:02:15.620891Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-02T19:58:58.443Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "1.0.01.17", }, { status: "affected", version: "1.0.03.17", }, { status: "affected", version: "1.0.01.16", }, { status: "affected", version: "1.0.01.18", }, { status: "affected", version: "1.0.00.29", }, { status: "affected", version: "1.0.03.16", }, { status: "affected", version: "1.0.03.15", }, { status: "affected", version: "1.0.02.16", }, { status: "affected", version: "1.0.01.20", }, { status: "affected", version: "1.0.00.33", }, { status: "affected", version: "1.0.03.18", }, { status: "affected", version: "1.0.03.19", }, { status: "affected", version: "1.0.03.20", }, { status: "affected", version: "1.0.03.21", }, { status: "affected", version: "1.0.03.22", }, { status: "affected", version: "1.0.03.24", }, { status: "affected", version: "1.0.03.26", }, { status: "affected", version: "1.0.03.27", }, { status: "affected", version: "1.0.03.28", }, { status: "affected", version: "1.0.03.29", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device.\r\n\r\nThis vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-285", description: "Improper Authorization", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-02T16:53:04.527Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-rv34x-privesc-rce-qE33TCms", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms", }, ], source: { advisory: "cisco-sa-rv34x-privesc-rce-qE33TCms", defects: [ "CSCwm27935", ], discovery: "EXTERNAL", }, title: "Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Privilege Escalation Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20393", datePublished: "2024-10-02T16:53:04.527Z", dateReserved: "2023-11-08T15:08:07.659Z", dateUpdated: "2024-10-02T19:58:58.443Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-20470
Vulnerability from cvelistv5
Published
2024-10-02 16:54
Modified
2024-10-02 19:18
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. In order to exploit this vulnerability, the attacker must have valid admin credentials.
This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Small Business RV Series Router Firmware |
Version: 1.0.01.17 Version: 1.0.03.17 Version: 1.0.01.16 Version: 1.0.01.18 Version: 1.0.00.29 Version: 1.0.03.16 Version: 1.0.03.15 Version: 1.0.02.16 Version: 1.0.01.20 Version: 1.0.00.33 Version: 1.0.03.18 Version: 1.0.03.19 Version: 1.0.03.20 Version: 1.0.03.21 Version: 1.0.03.22 Version: 1.0.03.24 Version: 1.0.03.26 Version: 1.0.03.27 Version: 1.0.03.28 Version: 1.0.03.29 |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2024-20470", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-02T18:58:00.677132Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-02T19:18:33.143Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco Small Business RV Series Router Firmware", vendor: "Cisco", versions: [ { status: "affected", version: "1.0.01.17", }, { status: "affected", version: "1.0.03.17", }, { status: "affected", version: "1.0.01.16", }, { status: "affected", version: "1.0.01.18", }, { status: "affected", version: "1.0.00.29", }, { status: "affected", version: "1.0.03.16", }, { status: "affected", version: "1.0.03.15", }, { status: "affected", version: "1.0.02.16", }, { status: "affected", version: "1.0.01.20", }, { status: "affected", version: "1.0.00.33", }, { status: "affected", version: "1.0.03.18", }, { status: "affected", version: "1.0.03.19", }, { status: "affected", version: "1.0.03.20", }, { status: "affected", version: "1.0.03.21", }, { status: "affected", version: "1.0.03.22", }, { status: "affected", version: "1.0.03.24", }, { status: "affected", version: "1.0.03.26", }, { status: "affected", version: "1.0.03.27", }, { status: "affected", version: "1.0.03.28", }, { status: "affected", version: "1.0.03.29", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. In order to exploit this vulnerability, the attacker must have valid admin credentials.\r\n\r\nThis vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-146", description: "Improper Neutralization of Expression/Command Delimiters", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-02T16:54:58.682Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-rv34x-privesc-rce-qE33TCms", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms", }, ], source: { advisory: "cisco-sa-rv34x-privesc-rce-qE33TCms", defects: [ "CSCwk99655", ], discovery: "EXTERNAL", }, title: "Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20470", datePublished: "2024-10-02T16:54:58.682Z", dateReserved: "2023-11-08T15:08:07.681Z", dateUpdated: "2024-10-02T19:18:33.143Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 14:37
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device.
This vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*", matchCriteriaId: "EBAD013E-3550-4157-B52A-F045DEFB0810", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*", matchCriteriaId: "566AF5EF-B7BD-4F4A-9D5E-82588207C80E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*", matchCriteriaId: "C0B4BB7F-FE4B-404D-9977-AAA3D492634B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*", matchCriteriaId: "F6BCBFF6-9A31-48BD-B93D-598564A3BB30", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*", matchCriteriaId: "DB20575D-3E22-49CA-91DE-CBACF2146D3E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*", matchCriteriaId: "8836DC95-1076-4CC4-8A6C-34F3ACCA312A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*", matchCriteriaId: "45488336-CAF5-4F15-BB6E-5BEBD87A4F97", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*", matchCriteriaId: "BB498AAC-2FAC-4FCC-B644-1180627A5D1F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*", matchCriteriaId: "744B76F8-1276-42ED-8913-5FC9E11F2F2E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*", matchCriteriaId: "1A4D7663-50E6-45B1-8701-2DF2D7F744AB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*", matchCriteriaId: "C0E4341D-9FD4-4AAD-A5BE-35B0909A8FE8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*", matchCriteriaId: "33A1EFF8-024B-46F6-A7E3-FCC593314B1A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*", matchCriteriaId: "D0D4C611-38FD-4BF1-B478-03F01283EAC5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*", matchCriteriaId: "4788385E-133A-4908-97A0-135403424DA9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*", matchCriteriaId: "150DE44A-A558-4C15-8028-C301259E5ABF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*", matchCriteriaId: "3B5E8D98-570C-49A1-9934-45BBCD02AB6A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*", matchCriteriaId: "6D9FF79A-BEE5-4204-B2C5-E0943DCD7773", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*", matchCriteriaId: "F15F5D4D-A256-4A2E-9873-F0514F81CA77", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*", matchCriteriaId: "9ACFBF35-E5B2-4807-AC7D-E3021EAAEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*", matchCriteriaId: "EA1379E9-D147-48F4-AE3A-860B49EFA497", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "C6822600-E716-4F22-AF34-AD2914D6C128", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*", matchCriteriaId: "5BC16280-4809-4B2C-825C-76A99392F95F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*", matchCriteriaId: "9A112271-F32C-49F5-B6DA-4DDBBB146106", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*", matchCriteriaId: "133E4C64-B9C8-4B65-927D-39B7BDF89AC2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*", matchCriteriaId: "ACD9ECA7-1DC4-4122-9D02-B258A62A2FA9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*", matchCriteriaId: "53A19846-F451-4578-A25B-F3777BE90C35", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*", matchCriteriaId: "A69964DE-67E6-4B1C-B3D2-C9177A891C40", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*", matchCriteriaId: "FB3346A2-D0FB-4AE7-87C0-793DE49D555B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*", matchCriteriaId: "40B366BB-EC50-4C1A-ACFA-61C86714FE1A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*", matchCriteriaId: "29C253B5-DAAD-45F0-8A45-B6F44FC74DAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*", matchCriteriaId: "4893D744-9041-4C89-A33C-8BB989B3FDFA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*", matchCriteriaId: "2AB31F2B-3A74-45DD-B21E-A698E321BA6B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*", matchCriteriaId: "CCE2B1CD-E350-4C5D-BAA6-17138A8343F5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*", matchCriteriaId: "03FFDBF2-939C-46A3-BA90-6DED64474338", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*", matchCriteriaId: "426C4FDC-AAF3-4726-80D0-7C48B06A7E65", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*", matchCriteriaId: "E08A813B-630D-4EF4-812B-9E81A48A1DC7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*", matchCriteriaId: "F27B5644-BA7B-4442-A539-337F93238479", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*", matchCriteriaId: "9504523A-37F0-417A-99B4-CABE21E5E744", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*", matchCriteriaId: "BE54D030-093B-4267-8169-C2DCF72605D3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*", matchCriteriaId: "D70E0828-1150-44FD-82C2-C441A3ACF644", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*", matchCriteriaId: "F1C0171B-4C5D-4C15-84DD-E556C5AFDCBA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E7E29320-5668-4F48-9BA1-DC81B256320B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*", matchCriteriaId: "85C44874-31B8-4872-9973-4444D15B09B7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*", matchCriteriaId: "005FADE6-BF4F-416A-965A-46BF5F6C6D0A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*", matchCriteriaId: "0F78C801-EC2A-4B28-9ED1-A30E3589C3F0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*", matchCriteriaId: "2218EEEA-BB4D-4343-BB9F-3C01EA473342", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*", matchCriteriaId: "609583B2-4D32-4E76-AA9B-DA24A1BAFB16", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*", matchCriteriaId: "59D15056-B04A-40F1-A6D4-66A91FCE5A75", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*", matchCriteriaId: "217B02B2-B4E6-40E7-993C-238D7FBEBFF9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*", matchCriteriaId: "5659BD61-EE0C-49BF-8484-034A58BA32E2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*", matchCriteriaId: "3B9B65AE-D6EF-4A2E-9C2D-D96E64506080", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*", matchCriteriaId: "383D6202-4215-46F5-9AA8-F7348997B99A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*", matchCriteriaId: "55939AC6-77E2-43E6-956C-B0B99CEAB315", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*", matchCriteriaId: "2385BD9B-80C6-4E54-A4A9-EEA724E58FE0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*", matchCriteriaId: "64CA692C-2D66-483B-A440-746A998CED07", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*", matchCriteriaId: "1D4AEE39-5EE2-43C7-80DC-B078A9953D4F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*", matchCriteriaId: "85FA6AFD-7A8E-4505-8E4F-3A06199E6697", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*", matchCriteriaId: "36FE60B1-EE9F-4034-9612-482E2EECFBEA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*", matchCriteriaId: "DCCD1FC1-6029-4DDC-898C-169E429D1FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*", matchCriteriaId: "1C1E99B3-ACEA-48C1-A649-497D5960F215", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*", matchCriteriaId: "53A69806-3B9F-46E5-877B-9477E3AF0A34", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*", matchCriteriaId: "95D01F5A-1CC5-4C52-AB70-5DF41588EF98", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5DF1ED87-3FDB-42CA-AA96-508B5F7B9206", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*", matchCriteriaId: "D2812299-2A3C-49AA-9E81-BE4AA50F0D8A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*", matchCriteriaId: "20569E42-E769-401B-8163-3981C7905943", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*", matchCriteriaId: "105566D1-80A2-4545-9BF9-B3382162CA48", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*", matchCriteriaId: "A468D852-CA7F-4561-9F0E-DB6A056A5F31", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*", matchCriteriaId: "C72F80EF-787D-4A5E-9B03-5215AD400571", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*", matchCriteriaId: "66D7C66E-AF9E-4419-B6CE-3489DC19212E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*", matchCriteriaId: "041D9323-A320-4492-BAC7-4E0B06FF56E1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*", matchCriteriaId: "2D047F9E-7BCE-4F7E-B334-426F46CFCE66", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*", matchCriteriaId: "77E8D977-F28F-46D9-8DA2-7A1746F4278F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*", matchCriteriaId: "A87D53D4-AF6F-4E5C-A7A4-099294029C59", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*", matchCriteriaId: "42672D7D-5265-4323-A284-F36722F7C36A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*", matchCriteriaId: "A71CFA39-CF25-4B37-855A-7816770633ED", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*", matchCriteriaId: "2649FFCF-D9E1-466A-A7ED-4A2653259A3E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*", matchCriteriaId: "743D74FF-2334-4C16-BDDD-FDFD4EEBF9EF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*", matchCriteriaId: "29AF1721-2676-4FDA-97E0-55E53A03AC16", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*", matchCriteriaId: "C3005E36-D17A-498B-9BF4-1D972FA03553", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*", matchCriteriaId: "EFD115E4-53C8-4E3C-9024-4AE5F1F5DFB0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*", matchCriteriaId: "1D0231F8-CC96-4F02-9737-654FECFCF624", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*", matchCriteriaId: "9C600D9E-4DDF-45A2-8760-749F0FB06513", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*", matchCriteriaId: "B675841D-7591-492F-BCF0-E63D416C7F1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p_dual_wan_gigabit_poe_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BF972452-70D7-4026-A326-ACDD7446DD9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device.\r\n\r\nThis vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de los enrutadores VPN Gigabit de doble WAN Cisco Small Business RV340, RV340W, RV345 y RV345P podría permitir que un atacante remoto autenticado eleve los privilegios en un dispositivo afectado. Esta vulnerabilidad existe porque la interfaz de administración basada en web revela información confidencial. Un atacante podría aprovechar esta vulnerabilidad enviando una entrada HTTP manipulada a un dispositivo afectado. Una explotación exitosa podría permitir que un atacante eleve los privilegios de invitado a administrador.", }, ], id: "CVE-2024-20393", lastModified: "2024-10-08T14:37:39.713", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-02T17:15:15.337", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-285", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-07-16 18:15
Modified
2024-11-21 05:30
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the Secure Sockets Layer (SSL) VPN feature for Cisco Small Business RV VPN Routers could allow an unauthenticated, remote attacker to cause the device to unexpectedly restart, causing a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to the targeted device. A successful exploit could allow the attacker to cause a reload, resulting in a DoS condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C731397-28D1-430F-99E0-F0BC98BB5AB0", versionEndExcluding: "1.0.03.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "C6822600-E716-4F22-AF34-AD2914D6C128", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9599A29D-0C3D-43F4-B2D5-49EA0AD21692", versionEndExcluding: "1.0.03.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E7E29320-5668-4F48-9BA1-DC81B256320B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "98978F6F-4127-411B-9FAD-14338DFD62BC", versionEndExcluding: "1.0.03.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5DF1ED87-3FDB-42CA-AA96-508B5F7B9206", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A6AD3449-D5B7-4232-B7F9-5042BF7DF2EA", versionEndExcluding: "1.0.03.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p_dual_wan_gigabit_poe_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BF972452-70D7-4026-A326-ACDD7446DD9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Secure Sockets Layer (SSL) VPN feature for Cisco Small Business RV VPN Routers could allow an unauthenticated, remote attacker to cause the device to unexpectedly restart, causing a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to the targeted device. A successful exploit could allow the attacker to cause a reload, resulting in a DoS condition.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad Secure Sockets Layer (SSL) VPN para Cisco Small Business RV VPN Routers, podría permitir a un atacante remoto no autenticado causar el reinicio inesperado del dispositivo, causando una condición de denegación de servicio (DoS). La vulnerabilidad es debido a una falta de una comprobación de entrada apropiada de las peticiones HTTP. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP diseñada por medio de una conexión SSL al dispositivo objetivo. Una explotación con éxito podría permitir a un atacante causar una recarga, resultando en una condición DoS", }, ], id: "CVE-2020-3358", lastModified: "2024-11-21T05:30:52.327", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-16T18:15:18.173", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-dos-ZN5GvNH7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-dos-ZN5GvNH7", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-07-16 18:15
Modified
2024-11-21 05:30
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause the device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because HTTP requests are not properly validated. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device or cause the device to reload, resulting in a DoS condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C731397-28D1-430F-99E0-F0BC98BB5AB0", versionEndExcluding: "1.0.03.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "C6822600-E716-4F22-AF34-AD2914D6C128", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9599A29D-0C3D-43F4-B2D5-49EA0AD21692", versionEndExcluding: "1.0.03.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E7E29320-5668-4F48-9BA1-DC81B256320B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "98978F6F-4127-411B-9FAD-14338DFD62BC", versionEndExcluding: "1.0.03.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5DF1ED87-3FDB-42CA-AA96-508B5F7B9206", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A6AD3449-D5B7-4232-B7F9-5042BF7DF2EA", versionEndExcluding: "1.0.03.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p_dual_wan_gigabit_poe_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BF972452-70D7-4026-A326-ACDD7446DD9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause the device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because HTTP requests are not properly validated. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device or cause the device to reload, resulting in a DoS condition.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad Secure Sockets Layer (SSL) VPN de Cisco Small Business RV340, RV340W, RV345, y RV345P Dual WAN Gigabit VPN Routers, podría permitir a un atacante remoto no autenticado ejecutar código arbitrario en un dispositivo afectado o causar la recarga del dispositivo, resultando en una condición de denegación de servicio (DoS). La vulnerabilidad se presenta porque las peticiones HTTP no son comprobadas apropiadamente. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP diseñada por medio de una conexión SSL hacia un dispositivo afectado. Una explotación con éxito podría permitir a un atacante ejecutar código arbitrario remotamente en el dispositivo o causar que el dispositivo se vuelva a cargar, resultando en una condición DoS", }, ], id: "CVE-2020-3357", lastModified: "2024-11-21T05:30:52.210", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-16T18:15:18.050", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rce-dos-9ZAjkx4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rce-dos-9ZAjkx4", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-09 16:55
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. In order to exploit this vulnerability, the attacker must have valid admin credentials.
This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*", matchCriteriaId: "EBAD013E-3550-4157-B52A-F045DEFB0810", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*", matchCriteriaId: "566AF5EF-B7BD-4F4A-9D5E-82588207C80E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*", matchCriteriaId: "C0B4BB7F-FE4B-404D-9977-AAA3D492634B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*", matchCriteriaId: "F6BCBFF6-9A31-48BD-B93D-598564A3BB30", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*", matchCriteriaId: "DB20575D-3E22-49CA-91DE-CBACF2146D3E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*", matchCriteriaId: "8836DC95-1076-4CC4-8A6C-34F3ACCA312A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*", matchCriteriaId: "45488336-CAF5-4F15-BB6E-5BEBD87A4F97", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*", matchCriteriaId: "BB498AAC-2FAC-4FCC-B644-1180627A5D1F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*", matchCriteriaId: "744B76F8-1276-42ED-8913-5FC9E11F2F2E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*", matchCriteriaId: "1A4D7663-50E6-45B1-8701-2DF2D7F744AB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*", matchCriteriaId: "C0E4341D-9FD4-4AAD-A5BE-35B0909A8FE8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*", matchCriteriaId: "33A1EFF8-024B-46F6-A7E3-FCC593314B1A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*", matchCriteriaId: "D0D4C611-38FD-4BF1-B478-03F01283EAC5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*", matchCriteriaId: "4788385E-133A-4908-97A0-135403424DA9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*", matchCriteriaId: "150DE44A-A558-4C15-8028-C301259E5ABF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*", matchCriteriaId: "3B5E8D98-570C-49A1-9934-45BBCD02AB6A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*", matchCriteriaId: "6D9FF79A-BEE5-4204-B2C5-E0943DCD7773", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*", matchCriteriaId: "F15F5D4D-A256-4A2E-9873-F0514F81CA77", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*", matchCriteriaId: "9ACFBF35-E5B2-4807-AC7D-E3021EAAEE94", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*", matchCriteriaId: "EA1379E9-D147-48F4-AE3A-860B49EFA497", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "C6822600-E716-4F22-AF34-AD2914D6C128", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*", matchCriteriaId: "5BC16280-4809-4B2C-825C-76A99392F95F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*", matchCriteriaId: "9A112271-F32C-49F5-B6DA-4DDBBB146106", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*", matchCriteriaId: "133E4C64-B9C8-4B65-927D-39B7BDF89AC2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*", matchCriteriaId: "ACD9ECA7-1DC4-4122-9D02-B258A62A2FA9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*", matchCriteriaId: "53A19846-F451-4578-A25B-F3777BE90C35", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*", matchCriteriaId: "A69964DE-67E6-4B1C-B3D2-C9177A891C40", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*", matchCriteriaId: "FB3346A2-D0FB-4AE7-87C0-793DE49D555B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*", matchCriteriaId: "40B366BB-EC50-4C1A-ACFA-61C86714FE1A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*", matchCriteriaId: "29C253B5-DAAD-45F0-8A45-B6F44FC74DAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*", matchCriteriaId: "4893D744-9041-4C89-A33C-8BB989B3FDFA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*", matchCriteriaId: "2AB31F2B-3A74-45DD-B21E-A698E321BA6B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*", matchCriteriaId: "CCE2B1CD-E350-4C5D-BAA6-17138A8343F5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*", matchCriteriaId: "03FFDBF2-939C-46A3-BA90-6DED64474338", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*", matchCriteriaId: "426C4FDC-AAF3-4726-80D0-7C48B06A7E65", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*", matchCriteriaId: "E08A813B-630D-4EF4-812B-9E81A48A1DC7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*", matchCriteriaId: "F27B5644-BA7B-4442-A539-337F93238479", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*", matchCriteriaId: "9504523A-37F0-417A-99B4-CABE21E5E744", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*", matchCriteriaId: "BE54D030-093B-4267-8169-C2DCF72605D3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*", matchCriteriaId: "D70E0828-1150-44FD-82C2-C441A3ACF644", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*", matchCriteriaId: "F1C0171B-4C5D-4C15-84DD-E556C5AFDCBA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E7E29320-5668-4F48-9BA1-DC81B256320B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*", matchCriteriaId: "85C44874-31B8-4872-9973-4444D15B09B7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*", matchCriteriaId: "005FADE6-BF4F-416A-965A-46BF5F6C6D0A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*", matchCriteriaId: "0F78C801-EC2A-4B28-9ED1-A30E3589C3F0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*", matchCriteriaId: "2218EEEA-BB4D-4343-BB9F-3C01EA473342", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*", matchCriteriaId: "609583B2-4D32-4E76-AA9B-DA24A1BAFB16", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*", matchCriteriaId: "59D15056-B04A-40F1-A6D4-66A91FCE5A75", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*", matchCriteriaId: "217B02B2-B4E6-40E7-993C-238D7FBEBFF9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*", matchCriteriaId: "5659BD61-EE0C-49BF-8484-034A58BA32E2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*", matchCriteriaId: "3B9B65AE-D6EF-4A2E-9C2D-D96E64506080", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*", matchCriteriaId: "383D6202-4215-46F5-9AA8-F7348997B99A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*", matchCriteriaId: "55939AC6-77E2-43E6-956C-B0B99CEAB315", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*", matchCriteriaId: "2385BD9B-80C6-4E54-A4A9-EEA724E58FE0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*", matchCriteriaId: "64CA692C-2D66-483B-A440-746A998CED07", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*", matchCriteriaId: "1D4AEE39-5EE2-43C7-80DC-B078A9953D4F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*", matchCriteriaId: "85FA6AFD-7A8E-4505-8E4F-3A06199E6697", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*", matchCriteriaId: "36FE60B1-EE9F-4034-9612-482E2EECFBEA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*", matchCriteriaId: "DCCD1FC1-6029-4DDC-898C-169E429D1FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*", matchCriteriaId: "1C1E99B3-ACEA-48C1-A649-497D5960F215", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*", matchCriteriaId: "53A69806-3B9F-46E5-877B-9477E3AF0A34", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*", matchCriteriaId: "95D01F5A-1CC5-4C52-AB70-5DF41588EF98", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5DF1ED87-3FDB-42CA-AA96-508B5F7B9206", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*", matchCriteriaId: "D2812299-2A3C-49AA-9E81-BE4AA50F0D8A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*", matchCriteriaId: "20569E42-E769-401B-8163-3981C7905943", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*", matchCriteriaId: "105566D1-80A2-4545-9BF9-B3382162CA48", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*", matchCriteriaId: "A468D852-CA7F-4561-9F0E-DB6A056A5F31", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*", matchCriteriaId: "C72F80EF-787D-4A5E-9B03-5215AD400571", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*", matchCriteriaId: "66D7C66E-AF9E-4419-B6CE-3489DC19212E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*", matchCriteriaId: "041D9323-A320-4492-BAC7-4E0B06FF56E1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*", matchCriteriaId: "2D047F9E-7BCE-4F7E-B334-426F46CFCE66", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*", matchCriteriaId: "77E8D977-F28F-46D9-8DA2-7A1746F4278F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*", matchCriteriaId: "A87D53D4-AF6F-4E5C-A7A4-099294029C59", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*", matchCriteriaId: "42672D7D-5265-4323-A284-F36722F7C36A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*", matchCriteriaId: "A71CFA39-CF25-4B37-855A-7816770633ED", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*", matchCriteriaId: "2649FFCF-D9E1-466A-A7ED-4A2653259A3E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*", matchCriteriaId: "743D74FF-2334-4C16-BDDD-FDFD4EEBF9EF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*", matchCriteriaId: "29AF1721-2676-4FDA-97E0-55E53A03AC16", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*", matchCriteriaId: "C3005E36-D17A-498B-9BF4-1D972FA03553", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*", matchCriteriaId: "EFD115E4-53C8-4E3C-9024-4AE5F1F5DFB0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*", matchCriteriaId: "1D0231F8-CC96-4F02-9737-654FECFCF624", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*", matchCriteriaId: "9C600D9E-4DDF-45A2-8760-749F0FB06513", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*", matchCriteriaId: "B675841D-7591-492F-BCF0-E63D416C7F1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:rv345p_dual_wan_gigabit_poe_vpn_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BF972452-70D7-4026-A326-ACDD7446DD9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. In order to exploit this vulnerability, the attacker must have valid admin credentials.\r\n\r\nThis vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de los enrutadores VPN Gigabit de doble WAN Cisco Small Business RV340, RV340W, RV345 y RV345P podría permitir que un atacante remoto autenticado ejecute código arbitrario en un dispositivo afectado. Para aprovechar esta vulnerabilidad, el atacante debe tener credenciales de administrador válidas. Esta vulnerabilidad existe porque la interfaz de administración basada en web no valida de manera suficiente la entrada proporcionada por el usuario. Un atacante podría aprovechar esta vulnerabilidad enviando una entrada HTTP manipulada a un dispositivo afectado. Una explotación exitosa podría permitir que el atacante ejecute código arbitrario como usuario raíz en el sistema operativo subyacente.", }, ], id: "CVE-2024-20470", lastModified: "2024-10-09T16:55:23.887", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.2, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-10-02T17:15:17.027", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-146", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }