All the vulnerabilites related to cisco - rv320_firmware
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E1462E9-4464-492C-8B91-6E020B9DCB23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E01122-CD88-4096-958A-8699B2A3DC3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A620D1C-1FBB-46C9-9904-1FC6342ED85E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDB4B5-9528-43CE-B8E6-B509EFCD11BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EA568A8-286F-4588-B946-6F9C97E08BCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3B7DECE-18C4-45AE-AF5C-657A4795C7F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20146", "lastModified": "2024-11-21T07:40:39.647", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:09.107", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar c\u00f3digo arbitrario sobre un dispositivo afectado. Las vulnerabilidades son debido a restricciones de l\u00edmite insuficientes en la entrada suministrada por el usuario para scripts en la interfaz de administraci\u00f3n basada en web. Un atacante con privilegios administrativos que sean suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones dise\u00f1adas que contienen valores demasiado grandes hacia un dispositivo afectado, causando un desbordamiento de la pila. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo se bloquee o permitir al atacante ejecutar c\u00f3digo arbitrario con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3295", "lastModified": "2024-11-21T05:30:45.183", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:13.497", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-04 16:29
Modified
2024-11-21 04:37
Severity ?
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability in the Online Help web service of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the service. The vulnerability exists because the Online Help web service of an affected device insufficiently validates user-supplied input. An attacker could exploit this vulnerability by persuading a user of the service to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected service or access sensitive browser-based information.This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/107776 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-xss | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107776 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-xss | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A10C191C-F101-40B2-8034-44E02A9EEA93", "versionEndExcluding": "1.4.2.22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "64C3C4E7-DB65-439A-AA85-F1F1C6B5C172", "versionEndExcluding": "1.4.2.22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Online Help web service of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the service. The vulnerability exists because the Online Help web service of an affected device insufficiently validates user-supplied input. An attacker could exploit this vulnerability by persuading a user of the service to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected service or access sensitive browser-based information.This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22." }, { "lang": "es", "value": "Una vulnerabilidad en el servicio web de ayuda online de los routers Small Business RV320 y RV325 Dual Gigabit WAN VPN de Cisco podr\u00eda permitir a un atacante remoto no autenticado realizar un ataque reflejado de Cross-Site Scripting (XSS) contra un usuario del servicio. Esta vulnerabilidad existe debido a que el servicio de ayuda online de un dispositivo afectado no valida suficientemente las entradas proporcionadas por el usuario. Un atacante podr\u00eda explotar esta vulnerabilidad persuadiendo a un usuario del servicio para que haga clic en un enlace malicioso. Un exploit con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo script arbitrario en el contexto del dispositivo afectado o acceder a informaci\u00f3n sensible del navegador. Esta vulnerabilidad afecta a los routers Cisco Small Business RV320 y RV325 Dual Gigabit WAN VPN que tienen versiones de firmware anteriores a la 1.4.2.22." } ], "id": "CVE-2019-1827", "lastModified": "2024-11-21T04:37:28.887", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-04T16:29:03.337", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107776" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-xss" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-xss" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-24 15:29
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv320_firmware | 1.4.2.15 | |
cisco | rv320 | - | |
cisco | rv325_firmware | 1.4.2.15 | |
cisco | rv325 | - |
{ "cisaActionDue": "2022-03-17", "cisaExploitAdd": "2022-03-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Cisco Small Business Routers Improper Input Validation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99BF6-11C0-448C-91B2-F03690CE9089", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "A402AB90-03C8-4B5B-AEF9-CDAC023DA6D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de gesti\u00f3n web de los routers Cisco Small Business Cisco Small Business RV320 y RV325 Dual Gigabit WAN VPN podr\u00eda permitir a un atacante remoto, autenticado con privilegios del administrador en un dispositivo afectado ejecutar comandos arbitrarios. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de las entradas proporcionadas por el usuario. Un atacante podr\u00eda explotar esta vulnerabilidad enviando peticiones HTTP POST maliciosas a la interfaz de gesti\u00f3n web del software afectado. Un exploit con \u00e9xito podr\u00eda permitir que el atacante ejecute comandos arbitrarios en el shell de Linux subyacente como root. Cisco ha publicado actualizaciones de firmware que tratan esta vulnerabilidad." } ], "id": "CVE-2019-1652", "lastModified": "2024-11-21T04:37:01.077", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-24T15:29:00.953", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html" }, { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/61" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106728" }, { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Mar/55" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject" }, { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46243/" }, { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46655/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/61" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Mar/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46243/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46655/" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 18:15
Modified
2024-11-21 07:40
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device. Cisco has not released software updates that address this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | - | |
cisco | rv016 | - | |
cisco | rv042_firmware | - | |
cisco | rv042 | - | |
cisco | rv042g_firmware | - | |
cisco | rv042g | - | |
cisco | rv082_firmware | - | |
cisco | rv082 | - | |
cisco | rv320_firmware | - | |
cisco | rv320 | - | |
cisco | rv325_firmware | - | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCC05438-3064-4FB6-9177-9EA60C8E250C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5A39236-B032-46BB-94D0-3E0E3E557BC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E699C11F-3C7C-420D-9243-5CD2A6B98EF2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF65E38-D812-4F6E-903C-05E203F3E9F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C17C5F-4EB7-4859-8127-AE027A72CB2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69F1C458-0EF3-4AD6-9055-355711F3751E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device. Cisco has not released software updates that address this vulnerability." } ], "id": "CVE-2023-20124", "lastModified": "2024-11-21T07:40:36.627", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T18:15:07.590", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv01x_rv32x_rce-nzAGWWDD" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv01x_rv32x_rce-nzAGWWDD" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | - | |
cisco | rv016 | - | |
cisco | rv042_firmware | - | |
cisco | rv042 | - | |
cisco | rv042g_firmware | - | |
cisco | rv042g | - | |
cisco | rv082_firmware | - | |
cisco | rv082 | - | |
cisco | rv320_firmware | - | |
cisco | rv320 | - | |
cisco | rv325_firmware | - | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCC05438-3064-4FB6-9177-9EA60C8E250C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5A39236-B032-46BB-94D0-3E0E3E557BC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E699C11F-3C7C-420D-9243-5CD2A6B98EF2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF65E38-D812-4F6E-903C-05E203F3E9F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C17C5F-4EB7-4859-8127-AE027A72CB2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69F1C458-0EF3-4AD6-9055-355711F3751E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20151", "lastModified": "2024-11-21T07:40:40.290", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:09.373", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as the root user on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates to address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv320_firmware | 1.5.1.13 | |
cisco | rv320 | - | |
cisco | rv325_firmware | 1.5.1.13 | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "B71B1E3F-F7DE-4B0A-8304-0980B6EDB776", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55476CAD-BDB3-46CB-95A0-74BA8F49A5D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as the root user on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates to address these vulnerabilities." } ], "id": "CVE-2023-20117", "lastModified": "2024-11-21T07:40:35.757", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:07.970", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv32x-cmdinject-cKQsZpxL" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv32x-cmdinject-cKQsZpxL" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-146" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E1462E9-4464-492C-8B91-6E020B9DCB23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E01122-CD88-4096-958A-8699B2A3DC3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A620D1C-1FBB-46C9-9904-1FC6342ED85E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDB4B5-9528-43CE-B8E6-B509EFCD11BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EA568A8-286F-4588-B946-6F9C97E08BCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3B7DECE-18C4-45AE-AF5C-657A4795C7F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20140", "lastModified": "2024-11-21T07:40:38.873", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:08.830", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E1462E9-4464-492C-8B91-6E020B9DCB23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E01122-CD88-4096-958A-8699B2A3DC3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A620D1C-1FBB-46C9-9904-1FC6342ED85E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDB4B5-9528-43CE-B8E6-B509EFCD11BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EA568A8-286F-4588-B946-6F9C97E08BCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3B7DECE-18C4-45AE-AF5C-657A4795C7F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20142", "lastModified": "2024-11-21T07:40:39.123", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:08.920", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-23 01:15
Modified
2024-11-21 04:29
Severity ?
Summary
A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system. When processed, the commands will be executed with root privileges. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by providing malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as the root user.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_multi-wan_vpn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E534B9B6-DBCC-4473-BD38-DF90CC61D39E", "versionEndExcluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016_multi-wan_vpn:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8580066-17BE-488C-B5C1-D0E9F2BD7C9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_dual_wan_vpn:*:*:*:*:*:*:*:*", "matchCriteriaId": "B81116AF-1EE9-4262-8B21-B7902413CD34", "versionEndExcluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042_dual_wan_vpn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FF97BC-5D3D-48EA-A145-62FFF9FDFFE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_dual_gigabit_wan_vpn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "406ECF95-218C-40F1-9F78-5E3E308AF8C5", "versionEndExcluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g_dual_gigabit_wan_vpn:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED6AF010-BD96-49E0-BF5D-C52AFEC7A054", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_dual_wan_vpn_router_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B283383B-64C1-46A5-94C8-2F17970BF9B4", "versionEndExcluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082_dual_wan_vpn_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "3591314E-434D-47C6-9BD1-B66C666A18D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "60553265-530B-404D-85B5-8700F4FFFA95", "versionEndExcluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320_dual_gigabit_wan_vpn_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A4073CB-F6EB-41BA-B1B7-ABCAF5F1BEF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE0F0603-4D94-49E3-96EA-58084D5BE67E", "versionEndExcluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325_dual_gigabit_wan_wf_vpn_router:-:*:*:*:*:*:*:*", "matchCriteriaId": "01F9F95A-679B-45AB-9191-C8F0EA1E555E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system. When processed, the commands will be executed with root privileges. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by providing malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as the root user." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de determinados Cisco Small Business RV Series Routers, podr\u00eda permitir a un atacante remoto autenticado con privilegios administrativos inyectar comandos arbitrarios en el sistema operativo subyacente.\u0026#xa0;Cuando son procesados, los comandos ser\u00e1n ejecutados con privilegios root.\u0026#xa0;La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de la entrada suministrada por el usuario.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad al proporcionar informaci\u00f3n maliciosa en un campo espec\u00edfico en la interfaz de administraci\u00f3n basada en web de un dispositivo afectado.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo Linux subyacente como un usuario root" } ], "id": "CVE-2019-15957", "lastModified": "2024-11-21T04:29:49.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-23T01:15:12.787", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbr-cominj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbr-cominj" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 13:50
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA9B2E23-F7F6-44C8-8800-CB3FAECBCDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "F445CE1E-CACF-4906-814D-3658EB5B8A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "987844EB-3E48-49DF-A95C-054D95F36F4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "54A716D3-2E68-4348-A42C-7ACB51107903", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F7458A81-C907-482C-889B-2DE32C1A9238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AAFC3C16-C6B4-4311-92C9-AB96BA91F8E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "CC353BA2-BCFC-44D1-A190-EFAC646E7D48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "C0466119-31BE-44AD-82A4-66C1315C128A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "62330002-CB84-434C-860A-A4C29B4C29C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "36A0F1E3-8FCA-4ED1-A6F1-FDC9D3F3E538", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "09CBB296-950D-42A1-B6F6-10EDF56AE763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F47C5A1E-5162-48E8-998C-5A452C86688E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C5E33427-60ED-4E42-A821-462A87BBEF53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B1A3E3E5-8B9F-4C15-A3B8-538202A60429", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "CFE2DAFE-F2A4-43A7-BAB5-053FE1D7BD30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "CD25C358-C310-41C1-AFA5-89E54D5012CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "A995298E-9655-4AAD-8ABC-71AC816E798D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "08DD66B1-F045-4500-B098-CA65F0914107", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "88DE2217-2A37-41D2-ADFE-6648969C676A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "BBC05564-DB6D-4EED-95D0-BF3553748E50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "59693DA5-9F18-4F4C-8C57-C7294CF12EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "1FEA0358-5E6A-465F-829C-7A05B64E2EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3604DDDE-7C98-4014-B50F-8E8808245644", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "92E2E999-774D-406A-BE8F-0B5A01E1D907", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5EC63ECD-D415-4D6C-A4E3-DCF6B8878474", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "D559E798-8CD9-463A-AF03-843BB589C599", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C6D3ACE2-D67A-46B4-97E7-F8085BBBD086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7C346A18-C543-4E3B-A1A8-B7757D6D6E45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "40970E5B-AC59-4A61-BD7F-64468C882385", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "A6A12CFD-3DF8-4B40-B0D3-8FBE037D1BE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "42FA29EE-8000-486C-AEC3-01AE3DE88007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "2C32756E-FBCA-4485-8AFF-3A83570D7CDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "B066474A-AE23-48AB-A550-4F2FF3758CA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "D6306152-5BD8-4BD3-9E2D-D523DA54D497", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "3A665527-A2C9-4C10-B902-79C158DC589F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "1E99461F-4395-4A30-8B6D-2F63CA9851F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "61F75405-494A-446C-9C19-CC39E121D529", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "6BD8AED3-E2B1-46D6-8E04-C5C3E4186BB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "C03B0889-8AAA-455F-BBB5-B5BC417904B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "4FA3AF56-BF90-4F9E-9E29-1FF9D112AF3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "D46196B0-8E14-49F6-9E16-6E441D133357", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "8212115A-A2E7-4CF9-8093-0BD9162FF26F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "3D70F5D9-7F51-4782-B8B5-30A5AB569464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "36651493-4F0C-4CF6-935D-B128C9741A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF65AFA9-26CD-4114-8246-07FAB904176B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "30972BB8-A616-4021-868F-A775092B3D41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "BBF50E2F-14D7-4738-B4DF-848A3F2814FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "F11630A4-0BBE-457E-B53F-11EA4448C92F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "D92E3198-22B2-491D-9815-2AA62AB0A30E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "EA876548-8B5A-4254-B154-58BCF03ADDA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3BCD33AD-A637-4C08-AE7E-9974B86CDDE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "935EA2B1-EC2A-4B17-A563-9515579D6161", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B38C7123-D65B-4840-AC28-A530CD4ECCA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "C0E595E2-B201-4689-B05D-1C3E44876D74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "F73AC635-05BF-4476-9548-D72D32A313FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "7A734929-DF60-4B5B-8380-1BBD093C1E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "E1D6863E-2DFB-4BDD-BC3A-B94F84F51E30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "816E98BD-38C5-41CC-8736-5BFFBBA447E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "86779EB2-CF50-4CEF-8815-56C8BB517698", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FAD122DD-2FB2-4E55-A77C-7235B5501C6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "E0955403-0054-476F-A162-77CCD5C475AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "5A9C297F-5B9E-4591-94C8-5EBEFB2D8CEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7EAB2D55-EE1B-499F-B0C0-78538660985E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3001E0B0-01FD-4DFC-B195-7CE2E156F990", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0B0EDE6F-47B3-48A2-A0C3-2AEC8FFA666E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "DE455ACF-E775-4ADE-95E9-F2162FE79486", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "94D78C7E-5E5A-457F-9D79-58E123145F41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0DCC0019-F4EF-4CB7-AED1-CC84A413DB1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "4BD3AE38-E227-4B55-B492-18614D258905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "AB9D70F1-9499-480A-A53E-8FC2BA17DCDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "DC7A6DF2-C4FC-4BAA-8ABB-0B60BA0357BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "575EC78E-71EE-4657-8413-7D60F2E933C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "834D2F6A-2590-4073-A6F5-AC88A32C30DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "EC89C839-57E0-4FDD-9597-01F8795B4DB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "A119367F-2F09-4750-A8B9-F176A10A55CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "C2062E92-F6BD-4AE7-86AA-682C36E33A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "25EC7568-713E-44DD-9418-23013749CC21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "63D3656F-9D46-4F6C-B8E1-B04243BFD57B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "86DE5F2E-9B5E-4430-8B3D-97843462FE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "0DA83932-5061-4F7B-B152-E013D679C7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "AFA29437-B6C7-4C74-90F6-5CF58F54756B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "261D3EEA-6227-4136-91DD-380A2BF3635A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "64765C29-84C1-4F41-9BB4-18A0C43B197C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "44B039E2-0220-481F-B550-3358402FB390", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "BA050DDE-682E-4A54-995A-E3EDB19E45EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B48800BA-A64E-4C18-A6A5-651FFF3A18ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "EC4983FF-DA90-4F10-A511-D0C2531D8380", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "AE80F7A6-0A91-488C-BEE8-F23057AA1ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "08029110-3FE5-4DEB-AE76-2B165C4E79C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "B9779344-6BAB-4D21-8DB2-4BA9D7E55F2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "490D19A8-3494-4133-8CA6-0733CDB4CC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99BF6-11C0-448C-91B2-F03690CE9089", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "61348305-FC9B-4DB4-B039-0A08D44812EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C8CE8BC-05D9-45D3-A645-D1A081E1A555", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6DC1BA1F-1210-4FBE-B218-B9FDC4711AE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "5539C19B-97D1-44C3-8883-0343B574133D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "99A1A830-0F70-47D7-89D5-7B50F69C6312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "43F1FCD5-4BC8-4051-982E-7112F5A128C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "B71B1E3F-F7DE-4B0A-8304-0980B6EDB776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "79F12DFE-4241-4D0B-A0BC-F022B6995921", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "383C020A-F8FD-48F9-8F82-1CDE8620D6E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6213B8E5-3E2E-43F0-A0ED-72EC414C39B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0CEE2D4D-5627-4DD5-B8A5-88B0A8440CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CE3F4194-12F3-4379-AC7E-7BB6BFD4A76B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A4DFF375-C9E5-40A9-9167-9DADE291763B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3A36C9D3-4CD6-4708-A721-4CA905306617", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7A0C39EC-75DC-4ECF-8012-C3062375836A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5A03BB26-A344-498B-8FE4-3D027EFC6606", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "E4DF1BAD-EFCF-4723-AAB5-B2733992659C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "CC474FF5-E3BE-4B81-B5AC-1D32A44C259F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "A5910845-D601-4503-82CC-49D8A11F4B31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "9F5FECB4-41D4-4FDF-8693-7FF1D51CF1D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "1DE7FBF1-11F4-4B36-BFD2-041A14E70360", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "4750C422-7D8B-45CC-BD33-35D9BE5FFBC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "40902BFF-81A9-4CFC-9FC1-61F353DEFDF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EA80139-B632-4108-BB44-41A4ABA41F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "0C17CE07-41E0-4115-AC82-5C697DA8C5C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E07888E-FEC4-43F2-90D1-91665606BD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "B338AFCE-9219-4F70-A08A-A9E6E0E967EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "A00ADE78-233F-4284-AC67-4606306D7EC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "664F445F-91A3-4AE9-8D60-76C656402EB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "01C90ED8-03B2-4FF8-9C8E-8340A5E8E13B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "557AB540-0F7F-4F54-9BCD-9103217C923E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "AA7F2FC6-F13E-445D-B2B6-01A7019F90F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7AAE28E-65DE-425A-917E-549DC1D0DFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "91CA984F-F579-421C-9A11-DCBE731A49FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "33E8C022-40EE-4B36-B7ED-3E51CBB1AB9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "26CD8F90-6BA8-466F-92D9-FFC264574F77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "FC42A543-F2BB-4FFF-9674-61D01F3406DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "BBEE1D3B-1D22-4024-9191-56B2615F8ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "A402AB90-03C8-4B5B-AEF9-CDAC023DA6D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "F865F54F-E4D6-4B92-9644-992A44F7D562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "91AC5D05-728E-49A8-8A75-2CF97FAFD68D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "D82F96CC-94E9-46C5-B886-CD63B2060145", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "EC425B75-5584-4184-BEC0-44FAD8B431DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "B9B992F2-43D5-4FBF-A94A-EA8E8B0EBB01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "A660B64F-2CF8-48C3-877E-B583E1CFC0FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55476CAD-BDB3-46CB-95A0-74BA8F49A5D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A89E5621-BA1F-450C-8E82-FC4764B54905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6B4DF0F5-853A-430E-8C93-556D4FF29C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "109BC8D1-E547-45C4-99AA-C74495F8E8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "67F823CE-90D6-4914-B125-88B6F868808D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "53551C1A-9DBD-4E5E-8FA7-C04EE2A38D20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CC2360AC-5C88-4F8B-9BC8-48FBA716CFBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F4C3D1D3-034B-4B6E-BC78-050D22A3D84E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "15271254-5905-4D08-BD9E-08F841AA29D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5AB609CB-934B-43E4-A884-FDC7B58D0560", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "70B52828-6B38-4561-9D79-83DD8EC294A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "9DDE7B4C-CF8F-4CE6-AD3F-CE74377D4077", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "523B6515-33AE-4606-A7D6-C698D26659D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "42A388D2-AE67-4B5E-AFEF-32F7834652E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "B30845DA-3C00-4567-B590-61BAC547B312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "D28A6411-627C-46BE-9D59-3519B3816BD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "00659549-4B19-4B16-8DBD-71627453A1EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "3724D315-5DCD-4378-85F1-1880C535317C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "45F4AF99-6774-4EF4-BD0C-64FE18FC3B46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado de nivel de administrador ejecute c\u00f3digo arbitrario como usuario ra\u00edz. Para aprovechar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario en la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes HTTP manipuladas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente como usuario ra\u00edz." } ], "id": "CVE-2024-20521", "lastModified": "2024-10-08T13:50:57.163", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:19.280", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E1462E9-4464-492C-8B91-6E020B9DCB23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E01122-CD88-4096-958A-8699B2A3DC3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A620D1C-1FBB-46C9-9904-1FC6342ED85E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDB4B5-9528-43CE-B8E6-B509EFCD11BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EA568A8-286F-4588-B946-6F9C97E08BCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3B7DECE-18C4-45AE-AF5C-657A4795C7F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20138", "lastModified": "2024-11-21T07:40:38.623", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:08.727", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar comandos arbitrarios sobre un dispositivo afectado. Las vulnerabilidades se presentan porque la interfaz de administraci\u00f3n basada en web no comprueba apropiadamente la entrada suministrada por el usuario para scripts. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones maliciosas hacia un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrarios con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3279", "lastModified": "2024-11-21T05:30:42.780", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:12.637", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E1462E9-4464-492C-8B91-6E020B9DCB23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E01122-CD88-4096-958A-8699B2A3DC3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A620D1C-1FBB-46C9-9904-1FC6342ED85E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDB4B5-9528-43CE-B8E6-B509EFCD11BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EA568A8-286F-4588-B946-6F9C97E08BCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3B7DECE-18C4-45AE-AF5C-657A4795C7F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20145", "lastModified": "2024-11-21T07:40:39.503", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:09.060", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar c\u00f3digo arbitrario sobre un dispositivo afectado. Las vulnerabilidades son debido a restricciones de l\u00edmite insuficientes en la entrada suministrada por el usuario para scripts en la interfaz de administraci\u00f3n basada en web. Un atacante con privilegios administrativos que sean suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones dise\u00f1adas que contienen valores demasiado grandes hacia un dispositivo afectado, causando un desbordamiento de la pila. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo se bloquee o permitir al atacante ejecutar c\u00f3digo arbitrario con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3293", "lastModified": "2024-11-21T05:30:44.930", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:13.323", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E1462E9-4464-492C-8B91-6E020B9DCB23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E01122-CD88-4096-958A-8699B2A3DC3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A620D1C-1FBB-46C9-9904-1FC6342ED85E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDB4B5-9528-43CE-B8E6-B509EFCD11BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EA568A8-286F-4588-B946-6F9C97E08BCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3B7DECE-18C4-45AE-AF5C-657A4795C7F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20144", "lastModified": "2024-11-21T07:40:39.377", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:09.017", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar comandos arbitrarios sobre un dispositivo afectado. Las vulnerabilidades se presentan porque la interfaz de administraci\u00f3n basada en web no comprueba apropiadamente la entrada suministrada por el usuario para scripts. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones maliciosas hacia un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrarios con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3277", "lastModified": "2024-11-21T05:30:42.540", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:12.417", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E1462E9-4464-492C-8B91-6E020B9DCB23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E01122-CD88-4096-958A-8699B2A3DC3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A620D1C-1FBB-46C9-9904-1FC6342ED85E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDB4B5-9528-43CE-B8E6-B509EFCD11BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EA568A8-286F-4588-B946-6F9C97E08BCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3B7DECE-18C4-45AE-AF5C-657A4795C7F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20147", "lastModified": "2024-11-21T07:40:39.787", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:09.167", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 13:48
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA9B2E23-F7F6-44C8-8800-CB3FAECBCDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "F445CE1E-CACF-4906-814D-3658EB5B8A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "987844EB-3E48-49DF-A95C-054D95F36F4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "54A716D3-2E68-4348-A42C-7ACB51107903", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F7458A81-C907-482C-889B-2DE32C1A9238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AAFC3C16-C6B4-4311-92C9-AB96BA91F8E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "CC353BA2-BCFC-44D1-A190-EFAC646E7D48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "C0466119-31BE-44AD-82A4-66C1315C128A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "62330002-CB84-434C-860A-A4C29B4C29C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "36A0F1E3-8FCA-4ED1-A6F1-FDC9D3F3E538", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "09CBB296-950D-42A1-B6F6-10EDF56AE763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F47C5A1E-5162-48E8-998C-5A452C86688E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C5E33427-60ED-4E42-A821-462A87BBEF53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B1A3E3E5-8B9F-4C15-A3B8-538202A60429", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "CFE2DAFE-F2A4-43A7-BAB5-053FE1D7BD30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "CD25C358-C310-41C1-AFA5-89E54D5012CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "A995298E-9655-4AAD-8ABC-71AC816E798D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "08DD66B1-F045-4500-B098-CA65F0914107", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "88DE2217-2A37-41D2-ADFE-6648969C676A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "BBC05564-DB6D-4EED-95D0-BF3553748E50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "59693DA5-9F18-4F4C-8C57-C7294CF12EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "1FEA0358-5E6A-465F-829C-7A05B64E2EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3604DDDE-7C98-4014-B50F-8E8808245644", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "92E2E999-774D-406A-BE8F-0B5A01E1D907", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5EC63ECD-D415-4D6C-A4E3-DCF6B8878474", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "D559E798-8CD9-463A-AF03-843BB589C599", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C6D3ACE2-D67A-46B4-97E7-F8085BBBD086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7C346A18-C543-4E3B-A1A8-B7757D6D6E45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "40970E5B-AC59-4A61-BD7F-64468C882385", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "A6A12CFD-3DF8-4B40-B0D3-8FBE037D1BE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "42FA29EE-8000-486C-AEC3-01AE3DE88007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "2C32756E-FBCA-4485-8AFF-3A83570D7CDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "B066474A-AE23-48AB-A550-4F2FF3758CA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "D6306152-5BD8-4BD3-9E2D-D523DA54D497", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "3A665527-A2C9-4C10-B902-79C158DC589F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "1E99461F-4395-4A30-8B6D-2F63CA9851F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "61F75405-494A-446C-9C19-CC39E121D529", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "6BD8AED3-E2B1-46D6-8E04-C5C3E4186BB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "C03B0889-8AAA-455F-BBB5-B5BC417904B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "4FA3AF56-BF90-4F9E-9E29-1FF9D112AF3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "D46196B0-8E14-49F6-9E16-6E441D133357", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "8212115A-A2E7-4CF9-8093-0BD9162FF26F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "3D70F5D9-7F51-4782-B8B5-30A5AB569464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "36651493-4F0C-4CF6-935D-B128C9741A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF65AFA9-26CD-4114-8246-07FAB904176B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "30972BB8-A616-4021-868F-A775092B3D41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "BBF50E2F-14D7-4738-B4DF-848A3F2814FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "F11630A4-0BBE-457E-B53F-11EA4448C92F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "D92E3198-22B2-491D-9815-2AA62AB0A30E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "EA876548-8B5A-4254-B154-58BCF03ADDA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3BCD33AD-A637-4C08-AE7E-9974B86CDDE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "935EA2B1-EC2A-4B17-A563-9515579D6161", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B38C7123-D65B-4840-AC28-A530CD4ECCA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "C0E595E2-B201-4689-B05D-1C3E44876D74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "F73AC635-05BF-4476-9548-D72D32A313FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "7A734929-DF60-4B5B-8380-1BBD093C1E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "E1D6863E-2DFB-4BDD-BC3A-B94F84F51E30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "816E98BD-38C5-41CC-8736-5BFFBBA447E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "86779EB2-CF50-4CEF-8815-56C8BB517698", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FAD122DD-2FB2-4E55-A77C-7235B5501C6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "E0955403-0054-476F-A162-77CCD5C475AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "5A9C297F-5B9E-4591-94C8-5EBEFB2D8CEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7EAB2D55-EE1B-499F-B0C0-78538660985E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3001E0B0-01FD-4DFC-B195-7CE2E156F990", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0B0EDE6F-47B3-48A2-A0C3-2AEC8FFA666E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "DE455ACF-E775-4ADE-95E9-F2162FE79486", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "94D78C7E-5E5A-457F-9D79-58E123145F41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0DCC0019-F4EF-4CB7-AED1-CC84A413DB1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "4BD3AE38-E227-4B55-B492-18614D258905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "AB9D70F1-9499-480A-A53E-8FC2BA17DCDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "DC7A6DF2-C4FC-4BAA-8ABB-0B60BA0357BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "575EC78E-71EE-4657-8413-7D60F2E933C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "834D2F6A-2590-4073-A6F5-AC88A32C30DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "EC89C839-57E0-4FDD-9597-01F8795B4DB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "A119367F-2F09-4750-A8B9-F176A10A55CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "C2062E92-F6BD-4AE7-86AA-682C36E33A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "25EC7568-713E-44DD-9418-23013749CC21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "63D3656F-9D46-4F6C-B8E1-B04243BFD57B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "86DE5F2E-9B5E-4430-8B3D-97843462FE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "0DA83932-5061-4F7B-B152-E013D679C7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "AFA29437-B6C7-4C74-90F6-5CF58F54756B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "261D3EEA-6227-4136-91DD-380A2BF3635A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "64765C29-84C1-4F41-9BB4-18A0C43B197C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "44B039E2-0220-481F-B550-3358402FB390", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "BA050DDE-682E-4A54-995A-E3EDB19E45EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B48800BA-A64E-4C18-A6A5-651FFF3A18ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "EC4983FF-DA90-4F10-A511-D0C2531D8380", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "AE80F7A6-0A91-488C-BEE8-F23057AA1ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "08029110-3FE5-4DEB-AE76-2B165C4E79C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "B9779344-6BAB-4D21-8DB2-4BA9D7E55F2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "490D19A8-3494-4133-8CA6-0733CDB4CC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99BF6-11C0-448C-91B2-F03690CE9089", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "61348305-FC9B-4DB4-B039-0A08D44812EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C8CE8BC-05D9-45D3-A645-D1A081E1A555", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6DC1BA1F-1210-4FBE-B218-B9FDC4711AE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "5539C19B-97D1-44C3-8883-0343B574133D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "99A1A830-0F70-47D7-89D5-7B50F69C6312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "43F1FCD5-4BC8-4051-982E-7112F5A128C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "B71B1E3F-F7DE-4B0A-8304-0980B6EDB776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "79F12DFE-4241-4D0B-A0BC-F022B6995921", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "383C020A-F8FD-48F9-8F82-1CDE8620D6E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6213B8E5-3E2E-43F0-A0ED-72EC414C39B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0CEE2D4D-5627-4DD5-B8A5-88B0A8440CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CE3F4194-12F3-4379-AC7E-7BB6BFD4A76B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A4DFF375-C9E5-40A9-9167-9DADE291763B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3A36C9D3-4CD6-4708-A721-4CA905306617", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7A0C39EC-75DC-4ECF-8012-C3062375836A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5A03BB26-A344-498B-8FE4-3D027EFC6606", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "E4DF1BAD-EFCF-4723-AAB5-B2733992659C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "CC474FF5-E3BE-4B81-B5AC-1D32A44C259F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "A5910845-D601-4503-82CC-49D8A11F4B31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "9F5FECB4-41D4-4FDF-8693-7FF1D51CF1D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "1DE7FBF1-11F4-4B36-BFD2-041A14E70360", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "4750C422-7D8B-45CC-BD33-35D9BE5FFBC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "40902BFF-81A9-4CFC-9FC1-61F353DEFDF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EA80139-B632-4108-BB44-41A4ABA41F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "0C17CE07-41E0-4115-AC82-5C697DA8C5C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E07888E-FEC4-43F2-90D1-91665606BD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "B338AFCE-9219-4F70-A08A-A9E6E0E967EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "A00ADE78-233F-4284-AC67-4606306D7EC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "664F445F-91A3-4AE9-8D60-76C656402EB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "01C90ED8-03B2-4FF8-9C8E-8340A5E8E13B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "557AB540-0F7F-4F54-9BCD-9103217C923E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "AA7F2FC6-F13E-445D-B2B6-01A7019F90F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7AAE28E-65DE-425A-917E-549DC1D0DFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "91CA984F-F579-421C-9A11-DCBE731A49FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "33E8C022-40EE-4B36-B7ED-3E51CBB1AB9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "26CD8F90-6BA8-466F-92D9-FFC264574F77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "FC42A543-F2BB-4FFF-9674-61D01F3406DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "BBEE1D3B-1D22-4024-9191-56B2615F8ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "A402AB90-03C8-4B5B-AEF9-CDAC023DA6D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "F865F54F-E4D6-4B92-9644-992A44F7D562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "91AC5D05-728E-49A8-8A75-2CF97FAFD68D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "D82F96CC-94E9-46C5-B886-CD63B2060145", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "EC425B75-5584-4184-BEC0-44FAD8B431DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "B9B992F2-43D5-4FBF-A94A-EA8E8B0EBB01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "A660B64F-2CF8-48C3-877E-B583E1CFC0FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55476CAD-BDB3-46CB-95A0-74BA8F49A5D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A89E5621-BA1F-450C-8E82-FC4764B54905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6B4DF0F5-853A-430E-8C93-556D4FF29C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "109BC8D1-E547-45C4-99AA-C74495F8E8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "67F823CE-90D6-4914-B125-88B6F868808D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "53551C1A-9DBD-4E5E-8FA7-C04EE2A38D20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CC2360AC-5C88-4F8B-9BC8-48FBA716CFBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F4C3D1D3-034B-4B6E-BC78-050D22A3D84E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "15271254-5905-4D08-BD9E-08F841AA29D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5AB609CB-934B-43E4-A884-FDC7B58D0560", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "70B52828-6B38-4561-9D79-83DD8EC294A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "9DDE7B4C-CF8F-4CE6-AD3F-CE74377D4077", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "523B6515-33AE-4606-A7D6-C698D26659D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "42A388D2-AE67-4B5E-AFEF-32F7834652E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "B30845DA-3C00-4567-B590-61BAC547B312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "D28A6411-627C-46BE-9D59-3519B3816BD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "00659549-4B19-4B16-8DBD-71627453A1EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "3724D315-5DCD-4378-85F1-1880C535317C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "45F4AF99-6774-4EF4-BD0C-64FE18FC3B46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado, de nivel de administrador, provoque una recarga inesperada de un dispositivo afectado, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Para explotar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada del usuario que se encuentra en los paquetes HTTP entrantes. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP manipulada a la interfaz de administraci\u00f3n basada en web del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante provoque una recarga inesperada del dispositivo, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2024-20524", "lastModified": "2024-10-08T13:48:58.273", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:19.930", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar c\u00f3digo arbitrario sobre un dispositivo afectado. Las vulnerabilidades son debido a restricciones de l\u00edmite insuficientes en la entrada suministrada por el usuario para scripts en la interfaz de administraci\u00f3n basada en web. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones dise\u00f1adas que contienen valores demasiado grandes hacia un dispositivo afectado, causando un desbordamiento de la pila. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo se bloquee o permitir al atacante ejecutar c\u00f3digo arbitrario con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3286", "lastModified": "2024-11-21T05:30:43.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:12.730", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar c\u00f3digo arbitrario sobre un dispositivo afectado. Las vulnerabilidades son debido a restricciones de l\u00edmite insuficientes en la entrada suministrada por el usuario para scripts en la interfaz de administraci\u00f3n basada en web. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones dise\u00f1adas que contienen valores demasiado grandes hacia un dispositivo afectado, causando un desbordamiento de la pila. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo se bloquee o permitir al atacante ejecutar c\u00f3digo arbitrario con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3288", "lastModified": "2024-11-21T05:30:43.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:12.900", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E1462E9-4464-492C-8B91-6E020B9DCB23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E01122-CD88-4096-958A-8699B2A3DC3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A620D1C-1FBB-46C9-9904-1FC6342ED85E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDB4B5-9528-43CE-B8E6-B509EFCD11BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EA568A8-286F-4588-B946-6F9C97E08BCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3B7DECE-18C4-45AE-AF5C-657A4795C7F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20137", "lastModified": "2024-11-21T07:40:38.490", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:08.663", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | - | |
cisco | rv016 | - | |
cisco | rv042_firmware | - | |
cisco | rv042 | - | |
cisco | rv042g_firmware | - | |
cisco | rv042g | - | |
cisco | rv082_firmware | - | |
cisco | rv082 | - | |
cisco | rv320_firmware | - | |
cisco | rv320 | - | |
cisco | rv325_firmware | - | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCC05438-3064-4FB6-9177-9EA60C8E250C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5A39236-B032-46BB-94D0-3E0E3E557BC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E699C11F-3C7C-420D-9243-5CD2A6B98EF2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF65E38-D812-4F6E-903C-05E203F3E9F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C17C5F-4EB7-4859-8127-AE027A72CB2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69F1C458-0EF3-4AD6-9055-355711F3751E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20150", "lastModified": "2024-11-21T07:40:40.163", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:09.317", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 13:47
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA9B2E23-F7F6-44C8-8800-CB3FAECBCDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "F445CE1E-CACF-4906-814D-3658EB5B8A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "987844EB-3E48-49DF-A95C-054D95F36F4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "54A716D3-2E68-4348-A42C-7ACB51107903", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F7458A81-C907-482C-889B-2DE32C1A9238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AAFC3C16-C6B4-4311-92C9-AB96BA91F8E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "CC353BA2-BCFC-44D1-A190-EFAC646E7D48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "C0466119-31BE-44AD-82A4-66C1315C128A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "62330002-CB84-434C-860A-A4C29B4C29C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "36A0F1E3-8FCA-4ED1-A6F1-FDC9D3F3E538", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "09CBB296-950D-42A1-B6F6-10EDF56AE763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F47C5A1E-5162-48E8-998C-5A452C86688E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C5E33427-60ED-4E42-A821-462A87BBEF53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B1A3E3E5-8B9F-4C15-A3B8-538202A60429", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "CFE2DAFE-F2A4-43A7-BAB5-053FE1D7BD30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "CD25C358-C310-41C1-AFA5-89E54D5012CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "A995298E-9655-4AAD-8ABC-71AC816E798D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "08DD66B1-F045-4500-B098-CA65F0914107", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "88DE2217-2A37-41D2-ADFE-6648969C676A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "BBC05564-DB6D-4EED-95D0-BF3553748E50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "59693DA5-9F18-4F4C-8C57-C7294CF12EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "1FEA0358-5E6A-465F-829C-7A05B64E2EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3604DDDE-7C98-4014-B50F-8E8808245644", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "92E2E999-774D-406A-BE8F-0B5A01E1D907", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5EC63ECD-D415-4D6C-A4E3-DCF6B8878474", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "D559E798-8CD9-463A-AF03-843BB589C599", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C6D3ACE2-D67A-46B4-97E7-F8085BBBD086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7C346A18-C543-4E3B-A1A8-B7757D6D6E45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "40970E5B-AC59-4A61-BD7F-64468C882385", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "A6A12CFD-3DF8-4B40-B0D3-8FBE037D1BE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "42FA29EE-8000-486C-AEC3-01AE3DE88007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "2C32756E-FBCA-4485-8AFF-3A83570D7CDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "B066474A-AE23-48AB-A550-4F2FF3758CA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "D6306152-5BD8-4BD3-9E2D-D523DA54D497", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "3A665527-A2C9-4C10-B902-79C158DC589F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "1E99461F-4395-4A30-8B6D-2F63CA9851F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "61F75405-494A-446C-9C19-CC39E121D529", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "6BD8AED3-E2B1-46D6-8E04-C5C3E4186BB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "C03B0889-8AAA-455F-BBB5-B5BC417904B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "4FA3AF56-BF90-4F9E-9E29-1FF9D112AF3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "D46196B0-8E14-49F6-9E16-6E441D133357", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "8212115A-A2E7-4CF9-8093-0BD9162FF26F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "3D70F5D9-7F51-4782-B8B5-30A5AB569464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "36651493-4F0C-4CF6-935D-B128C9741A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF65AFA9-26CD-4114-8246-07FAB904176B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "30972BB8-A616-4021-868F-A775092B3D41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "BBF50E2F-14D7-4738-B4DF-848A3F2814FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "F11630A4-0BBE-457E-B53F-11EA4448C92F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "D92E3198-22B2-491D-9815-2AA62AB0A30E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "EA876548-8B5A-4254-B154-58BCF03ADDA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3BCD33AD-A637-4C08-AE7E-9974B86CDDE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "935EA2B1-EC2A-4B17-A563-9515579D6161", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B38C7123-D65B-4840-AC28-A530CD4ECCA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "C0E595E2-B201-4689-B05D-1C3E44876D74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "F73AC635-05BF-4476-9548-D72D32A313FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "7A734929-DF60-4B5B-8380-1BBD093C1E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "E1D6863E-2DFB-4BDD-BC3A-B94F84F51E30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "816E98BD-38C5-41CC-8736-5BFFBBA447E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "86779EB2-CF50-4CEF-8815-56C8BB517698", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FAD122DD-2FB2-4E55-A77C-7235B5501C6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "E0955403-0054-476F-A162-77CCD5C475AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "5A9C297F-5B9E-4591-94C8-5EBEFB2D8CEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7EAB2D55-EE1B-499F-B0C0-78538660985E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3001E0B0-01FD-4DFC-B195-7CE2E156F990", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0B0EDE6F-47B3-48A2-A0C3-2AEC8FFA666E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "DE455ACF-E775-4ADE-95E9-F2162FE79486", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "94D78C7E-5E5A-457F-9D79-58E123145F41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0DCC0019-F4EF-4CB7-AED1-CC84A413DB1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "4BD3AE38-E227-4B55-B492-18614D258905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "AB9D70F1-9499-480A-A53E-8FC2BA17DCDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "DC7A6DF2-C4FC-4BAA-8ABB-0B60BA0357BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "575EC78E-71EE-4657-8413-7D60F2E933C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "834D2F6A-2590-4073-A6F5-AC88A32C30DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "EC89C839-57E0-4FDD-9597-01F8795B4DB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "A119367F-2F09-4750-A8B9-F176A10A55CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "C2062E92-F6BD-4AE7-86AA-682C36E33A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "25EC7568-713E-44DD-9418-23013749CC21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "63D3656F-9D46-4F6C-B8E1-B04243BFD57B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "86DE5F2E-9B5E-4430-8B3D-97843462FE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "0DA83932-5061-4F7B-B152-E013D679C7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "AFA29437-B6C7-4C74-90F6-5CF58F54756B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "261D3EEA-6227-4136-91DD-380A2BF3635A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "64765C29-84C1-4F41-9BB4-18A0C43B197C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "44B039E2-0220-481F-B550-3358402FB390", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "BA050DDE-682E-4A54-995A-E3EDB19E45EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B48800BA-A64E-4C18-A6A5-651FFF3A18ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "EC4983FF-DA90-4F10-A511-D0C2531D8380", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "AE80F7A6-0A91-488C-BEE8-F23057AA1ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "08029110-3FE5-4DEB-AE76-2B165C4E79C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "B9779344-6BAB-4D21-8DB2-4BA9D7E55F2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "490D19A8-3494-4133-8CA6-0733CDB4CC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99BF6-11C0-448C-91B2-F03690CE9089", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "61348305-FC9B-4DB4-B039-0A08D44812EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C8CE8BC-05D9-45D3-A645-D1A081E1A555", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6DC1BA1F-1210-4FBE-B218-B9FDC4711AE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "5539C19B-97D1-44C3-8883-0343B574133D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "99A1A830-0F70-47D7-89D5-7B50F69C6312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "43F1FCD5-4BC8-4051-982E-7112F5A128C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "B71B1E3F-F7DE-4B0A-8304-0980B6EDB776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "79F12DFE-4241-4D0B-A0BC-F022B6995921", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "383C020A-F8FD-48F9-8F82-1CDE8620D6E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6213B8E5-3E2E-43F0-A0ED-72EC414C39B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0CEE2D4D-5627-4DD5-B8A5-88B0A8440CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CE3F4194-12F3-4379-AC7E-7BB6BFD4A76B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A4DFF375-C9E5-40A9-9167-9DADE291763B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3A36C9D3-4CD6-4708-A721-4CA905306617", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7A0C39EC-75DC-4ECF-8012-C3062375836A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5A03BB26-A344-498B-8FE4-3D027EFC6606", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "E4DF1BAD-EFCF-4723-AAB5-B2733992659C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "CC474FF5-E3BE-4B81-B5AC-1D32A44C259F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "A5910845-D601-4503-82CC-49D8A11F4B31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "9F5FECB4-41D4-4FDF-8693-7FF1D51CF1D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "1DE7FBF1-11F4-4B36-BFD2-041A14E70360", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "4750C422-7D8B-45CC-BD33-35D9BE5FFBC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "40902BFF-81A9-4CFC-9FC1-61F353DEFDF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EA80139-B632-4108-BB44-41A4ABA41F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "0C17CE07-41E0-4115-AC82-5C697DA8C5C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E07888E-FEC4-43F2-90D1-91665606BD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "B338AFCE-9219-4F70-A08A-A9E6E0E967EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "A00ADE78-233F-4284-AC67-4606306D7EC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "664F445F-91A3-4AE9-8D60-76C656402EB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "01C90ED8-03B2-4FF8-9C8E-8340A5E8E13B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "557AB540-0F7F-4F54-9BCD-9103217C923E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "AA7F2FC6-F13E-445D-B2B6-01A7019F90F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7AAE28E-65DE-425A-917E-549DC1D0DFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "91CA984F-F579-421C-9A11-DCBE731A49FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "33E8C022-40EE-4B36-B7ED-3E51CBB1AB9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "26CD8F90-6BA8-466F-92D9-FFC264574F77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "FC42A543-F2BB-4FFF-9674-61D01F3406DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "BBEE1D3B-1D22-4024-9191-56B2615F8ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "A402AB90-03C8-4B5B-AEF9-CDAC023DA6D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "F865F54F-E4D6-4B92-9644-992A44F7D562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "91AC5D05-728E-49A8-8A75-2CF97FAFD68D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "D82F96CC-94E9-46C5-B886-CD63B2060145", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "EC425B75-5584-4184-BEC0-44FAD8B431DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "B9B992F2-43D5-4FBF-A94A-EA8E8B0EBB01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "A660B64F-2CF8-48C3-877E-B583E1CFC0FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55476CAD-BDB3-46CB-95A0-74BA8F49A5D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A89E5621-BA1F-450C-8E82-FC4764B54905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6B4DF0F5-853A-430E-8C93-556D4FF29C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "109BC8D1-E547-45C4-99AA-C74495F8E8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "67F823CE-90D6-4914-B125-88B6F868808D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "53551C1A-9DBD-4E5E-8FA7-C04EE2A38D20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CC2360AC-5C88-4F8B-9BC8-48FBA716CFBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F4C3D1D3-034B-4B6E-BC78-050D22A3D84E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "15271254-5905-4D08-BD9E-08F841AA29D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5AB609CB-934B-43E4-A884-FDC7B58D0560", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "70B52828-6B38-4561-9D79-83DD8EC294A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "9DDE7B4C-CF8F-4CE6-AD3F-CE74377D4077", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "523B6515-33AE-4606-A7D6-C698D26659D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "42A388D2-AE67-4B5E-AFEF-32F7834652E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "B30845DA-3C00-4567-B590-61BAC547B312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "D28A6411-627C-46BE-9D59-3519B3816BD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "00659549-4B19-4B16-8DBD-71627453A1EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "3724D315-5DCD-4378-85F1-1880C535317C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "45F4AF99-6774-4EF4-BD0C-64FE18FC3B46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado, de nivel de administrador, provoque una recarga inesperada de un dispositivo afectado, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Para explotar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada del usuario que se encuentra en los paquetes HTTP entrantes. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP manipulada a la interfaz de administraci\u00f3n basada en web del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante provoque una recarga inesperada del dispositivo, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2024-20517", "lastModified": "2024-10-08T13:47:52.483", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:18.417", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-12 15:29
Modified
2024-11-21 02:34
Severity ?
Summary
Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - | |
cisco | rvs4000_firmware | * | |
cisco | rvs4000 | - | |
cisco | wrv210_firmware | * | |
cisco | wrv210 | - | |
cisco | wap4410n_firmware | * | |
cisco | wap4410n | - | |
cisco | wrv200_firmware | 1.0.39 | |
cisco | wrv200 | - | |
cisco | wrvs4400n_firmware | * | |
cisco | wrvs4400n | - | |
cisco | wap200_firmware | * | |
cisco | wap200 | - | |
cisco | wvc2300_firmware | * | |
cisco | wvc2300 | - | |
cisco | pvc2300_firmware | * | |
cisco | pvc2300 | - | |
cisco | srw224p_firmware | * | |
cisco | srw224p | - | |
cisco | wet200_firmware | * | |
cisco | wet200 | - | |
cisco | wap2000_firmware | * | |
cisco | wap2000 | - | |
cisco | wap4400n_firmware | * | |
cisco | wap4400n | - | |
cisco | rv120w_firmware | * | |
cisco | rv120w | - | |
cisco | rv180_firmware | * | |
cisco | rv180 | - | |
cisco | rv180w_firmware | * | |
cisco | rv180w | - | |
cisco | rv315w_firmware | * | |
cisco | rv315w | - | |
cisco | srp520_firmware | * | |
cisco | srp520 | - | |
cisco | srp520-u_firmware | * | |
cisco | srp520-u | - | |
cisco | wrp500_firmware | * | |
cisco | wrp500 | - | |
cisco | spa400_firmware | * | |
cisco | spa400 | - | |
cisco | rtp300_firmware | * | |
cisco | rtp300 | - | |
cisco | rv220w_firmware | * | |
cisco | rv220w | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F503CBF1-C2FB-40ED-8DA4-85F233EC4F8F", "versionEndIncluding": "1.3.1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE1BC6E1-8A83-438F-AE33-3AAED7DF1CBE", "versionEndIncluding": "1.3.1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rvs4000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7881E4BC-6590-49C0-88C4-A21F2BE2B4FE", "versionEndIncluding": "2.0.3.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rvs4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC30BCF7-FA1A-44B3-8C58-17DFA939E7C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wrv210_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E9D1511-2B20-4013-9504-0FE9A9B5220C", "versionEndIncluding": "2.0.1.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wrv210:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FA20862-B235-4230-8861-A59CF62CC65E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wap4410n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB758D90-1888-42E3-9305-82F59D9C1891", "versionEndIncluding": "2.0.7.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wap4410n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFF89AC2-2A85-463C-A644-B3FA31A470FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wrv200_firmware:1.0.39:*:*:*:*:*:*:*", "matchCriteriaId": "57B0AF22-058C-4273-8A3F-744692DFB77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wrv200:-:*:*:*:*:*:*:*", "matchCriteriaId": "F73575BC-B0E8-49A5-8E68-4D9B3109029D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wrvs4400n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1D37CC-A650-496D-B66B-62F69EFFFCCC", "versionEndIncluding": "2.0.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wrvs4400n:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC842A29-7A55-4474-B5AD-A6813FE16A7D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wap200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBC035F1-83DE-47F1-BF2D-72FE32E926BC", "versionEndIncluding": "2.0.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wap200:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD50A4C8-8E79-4D0B-8D23-88425EFE9234", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wvc2300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6F6D758-4D48-4D16-B54C-08F924D8623C", "versionEndIncluding": "1.1.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wvc2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1122B4F-87D0-4030-9C4C-E811BBEAC51F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:pvc2300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24B3D0D5-BA35-44A7-A9AC-EFC38638424E", "versionEndIncluding": "1.1.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:pvc2300:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B259F8-E3F8-44D0-9EDB-BC686F239CF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:srw224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72473F9C-4AD6-47AE-9568-D7451EB8DD09", "versionEndIncluding": "2.0.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:srw224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B559090-2CB3-41E6-B9C8-EB83FC7AFE54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wet200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1B80159-909F-4B59-9DC6-34C1E508FCD1", "versionEndIncluding": "2.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wet200:-:*:*:*:*:*:*:*", "matchCriteriaId": "565A92B8-DF55-4F7D-B312-E1870728F27A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wap2000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3751819E-FF92-4540-93D2-2D8F8427D826", "versionEndIncluding": "2.0.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wap2000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4844B66-4D3A-4526-87A3-6C45B9360691", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wap4400n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C17056F7-933C-45AD-8F75-64E4B9ADFB55", "versionEndIncluding": "-", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wap4400n:-:*:*:*:*:*:*:*", "matchCriteriaId": "D47B755E-277A-4FF5-B005-C7F28B191D6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv120w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34E8DF08-06D6-46EE-AE4A-8FA11D3E1FB9", "versionEndIncluding": "1.0.5.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv120w:-:*:*:*:*:*:*:*", "matchCriteriaId": "40465CA8-BE8B-4F15-8578-D8972C241D84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv180_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A27C46AD-51E7-463F-A296-D4C6DF9B01F7", "versionEndIncluding": "1.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv180:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8BD67F3-98CE-4B03-8980-6791B753FDC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv180w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA690405-6AB8-4503-90AB-0B25F50F4776", "versionEndIncluding": "1.0.5.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv180w:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5E3FBF6-4EB3-4C2F-AE0E-25F5765DD107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv315w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EEDA17A-529D-455C-B608-DFCFEC4DD448", "versionEndIncluding": "1.01.03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv315w:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D7B47D7-4D6B-43BF-BF1C-E89C781DDD14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:srp520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "857DB576-9674-42E1-B122-0ACCD696818F", "versionEndIncluding": "1.01.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:srp520:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEE62C2A-30E6-4E0F-AC84-1A75F5032D22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:srp520-u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F87C7EB8-4AF8-484E-B90F-B5E2C77D7679", "versionEndIncluding": "1.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:srp520-u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4A12DCA-F804-4CC1-B1FE-EF4A182A9722", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wrp500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67487247-39A1-4EF9-A451-3A2585CC7D54", "versionEndIncluding": "1.0.1.002", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wrp500:-:*:*:*:*:*:*:*", "matchCriteriaId": "78DAF22A-9A5A-4E55-AF0F-ED9969610411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:spa400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26067A0B-6752-4008-A021-57A76AC84F26", "versionEndIncluding": "1.1.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:spa400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A20F9B77-999F-4B2E-8894-6D6AED4A92CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rtp300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "114E7DD2-5C5F-40A2-A795-FF75FACB4567", "versionEndIncluding": "3.1.24", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rtp300:-:*:*:*:*:*:*:*", "matchCriteriaId": "78E72C11-E53D-4E29-802A-002F0229C158", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv220w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9C4E5A6-88BB-4758-8222-369BAE95C14B", "versionEndIncluding": "1.0.4.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv220w:-:*:*:*:*:*:*:*", "matchCriteriaId": "8620DFD9-E280-464E-91FF-2E901EDD49C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913." }, { "lang": "es", "value": "M\u00faltiples dispositivos con software de Cisco incorporado utilizan certificados X.509 embebidos y claves de host SSH embebidas en el firmware, lo que permite que atacantes remotos superen los mecanismos de protecci\u00f3n criptogr\u00e1fica y realicen ataques Man-in-the-Middle (MitM) sabiendo de estos certificados y claves de otra instalaci\u00f3n. Esto tambi\u00e9n se conoce por los siguientes Bug ID: CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899 y CSCuw90913." } ], "id": "CVE-2015-6358", "lastModified": "2024-11-21T02:34:50.923", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-12T15:29:00.217", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/566724" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/78047" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034255" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034256" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034257" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/566724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/78047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034255" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034258" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-04 16:29
Modified
2024-11-21 04:37
Severity ?
5.9 (Medium) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
8.1 (High) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/107774 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-weak-encrypt | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107774 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-weak-encrypt | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A10C191C-F101-40B2-8034-44E02A9EEA93", "versionEndExcluding": "1.4.2.22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "64C3C4E7-DB65-439A-AA85-F1F1C6B5C172", "versionEndExcluding": "1.4.2.22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n web de los routers de Cisco Small Business RV320 y RV325 Dual Gigabit WAN VPN podr\u00eda permitir que un atacante remoto sin autenticar acceda a las credenciales de administraci\u00f3n. Esta vulnerabilidad existe debido a que los dispositivos afectados utilizan algoritmos de cifrado d\u00e9biles para las credenciales de usuario. Un atacante podr\u00eda explotar esta vulnerabilidad realizando un ataque Man-in-the-Middle (MitM) y descifrando las credenciales interceptadas. Un exploit con \u00e9xito podr\u00eda permitir al atacante obtener acceso al un dispositivo afectado con privilegios de administrador. Esta vulnerabilidad afecta a los routers de Cisco Small Business RV320 y RV325 Dual Gigabit WAN VPN que tienen versiones de firmware anteriores a la 1.4.2.22." } ], "id": "CVE-2019-1828", "lastModified": "2024-11-21T04:37:29.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-04T16:29:03.383", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107774" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-weak-encrypt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-weak-encrypt" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 13:50
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA9B2E23-F7F6-44C8-8800-CB3FAECBCDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "F445CE1E-CACF-4906-814D-3658EB5B8A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "987844EB-3E48-49DF-A95C-054D95F36F4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "54A716D3-2E68-4348-A42C-7ACB51107903", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F7458A81-C907-482C-889B-2DE32C1A9238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AAFC3C16-C6B4-4311-92C9-AB96BA91F8E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "CC353BA2-BCFC-44D1-A190-EFAC646E7D48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "C0466119-31BE-44AD-82A4-66C1315C128A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "62330002-CB84-434C-860A-A4C29B4C29C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "36A0F1E3-8FCA-4ED1-A6F1-FDC9D3F3E538", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "09CBB296-950D-42A1-B6F6-10EDF56AE763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F47C5A1E-5162-48E8-998C-5A452C86688E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C5E33427-60ED-4E42-A821-462A87BBEF53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B1A3E3E5-8B9F-4C15-A3B8-538202A60429", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "CFE2DAFE-F2A4-43A7-BAB5-053FE1D7BD30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "CD25C358-C310-41C1-AFA5-89E54D5012CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "A995298E-9655-4AAD-8ABC-71AC816E798D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "08DD66B1-F045-4500-B098-CA65F0914107", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "88DE2217-2A37-41D2-ADFE-6648969C676A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "BBC05564-DB6D-4EED-95D0-BF3553748E50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "59693DA5-9F18-4F4C-8C57-C7294CF12EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "1FEA0358-5E6A-465F-829C-7A05B64E2EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3604DDDE-7C98-4014-B50F-8E8808245644", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "92E2E999-774D-406A-BE8F-0B5A01E1D907", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5EC63ECD-D415-4D6C-A4E3-DCF6B8878474", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "D559E798-8CD9-463A-AF03-843BB589C599", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C6D3ACE2-D67A-46B4-97E7-F8085BBBD086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7C346A18-C543-4E3B-A1A8-B7757D6D6E45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "40970E5B-AC59-4A61-BD7F-64468C882385", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "A6A12CFD-3DF8-4B40-B0D3-8FBE037D1BE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "42FA29EE-8000-486C-AEC3-01AE3DE88007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "2C32756E-FBCA-4485-8AFF-3A83570D7CDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "B066474A-AE23-48AB-A550-4F2FF3758CA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "D6306152-5BD8-4BD3-9E2D-D523DA54D497", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "3A665527-A2C9-4C10-B902-79C158DC589F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "1E99461F-4395-4A30-8B6D-2F63CA9851F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "61F75405-494A-446C-9C19-CC39E121D529", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "6BD8AED3-E2B1-46D6-8E04-C5C3E4186BB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "C03B0889-8AAA-455F-BBB5-B5BC417904B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "4FA3AF56-BF90-4F9E-9E29-1FF9D112AF3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "D46196B0-8E14-49F6-9E16-6E441D133357", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "8212115A-A2E7-4CF9-8093-0BD9162FF26F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "3D70F5D9-7F51-4782-B8B5-30A5AB569464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "36651493-4F0C-4CF6-935D-B128C9741A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF65AFA9-26CD-4114-8246-07FAB904176B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "30972BB8-A616-4021-868F-A775092B3D41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "BBF50E2F-14D7-4738-B4DF-848A3F2814FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "F11630A4-0BBE-457E-B53F-11EA4448C92F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "D92E3198-22B2-491D-9815-2AA62AB0A30E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "EA876548-8B5A-4254-B154-58BCF03ADDA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3BCD33AD-A637-4C08-AE7E-9974B86CDDE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "935EA2B1-EC2A-4B17-A563-9515579D6161", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B38C7123-D65B-4840-AC28-A530CD4ECCA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "C0E595E2-B201-4689-B05D-1C3E44876D74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "F73AC635-05BF-4476-9548-D72D32A313FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "7A734929-DF60-4B5B-8380-1BBD093C1E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "E1D6863E-2DFB-4BDD-BC3A-B94F84F51E30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "816E98BD-38C5-41CC-8736-5BFFBBA447E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "86779EB2-CF50-4CEF-8815-56C8BB517698", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FAD122DD-2FB2-4E55-A77C-7235B5501C6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "E0955403-0054-476F-A162-77CCD5C475AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "5A9C297F-5B9E-4591-94C8-5EBEFB2D8CEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7EAB2D55-EE1B-499F-B0C0-78538660985E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3001E0B0-01FD-4DFC-B195-7CE2E156F990", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0B0EDE6F-47B3-48A2-A0C3-2AEC8FFA666E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "DE455ACF-E775-4ADE-95E9-F2162FE79486", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "94D78C7E-5E5A-457F-9D79-58E123145F41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0DCC0019-F4EF-4CB7-AED1-CC84A413DB1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "4BD3AE38-E227-4B55-B492-18614D258905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "AB9D70F1-9499-480A-A53E-8FC2BA17DCDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "DC7A6DF2-C4FC-4BAA-8ABB-0B60BA0357BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "575EC78E-71EE-4657-8413-7D60F2E933C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "834D2F6A-2590-4073-A6F5-AC88A32C30DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "EC89C839-57E0-4FDD-9597-01F8795B4DB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "A119367F-2F09-4750-A8B9-F176A10A55CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "C2062E92-F6BD-4AE7-86AA-682C36E33A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "25EC7568-713E-44DD-9418-23013749CC21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "63D3656F-9D46-4F6C-B8E1-B04243BFD57B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "86DE5F2E-9B5E-4430-8B3D-97843462FE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "0DA83932-5061-4F7B-B152-E013D679C7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "AFA29437-B6C7-4C74-90F6-5CF58F54756B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "261D3EEA-6227-4136-91DD-380A2BF3635A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "64765C29-84C1-4F41-9BB4-18A0C43B197C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "44B039E2-0220-481F-B550-3358402FB390", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "BA050DDE-682E-4A54-995A-E3EDB19E45EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B48800BA-A64E-4C18-A6A5-651FFF3A18ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "EC4983FF-DA90-4F10-A511-D0C2531D8380", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "AE80F7A6-0A91-488C-BEE8-F23057AA1ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "08029110-3FE5-4DEB-AE76-2B165C4E79C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "B9779344-6BAB-4D21-8DB2-4BA9D7E55F2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "490D19A8-3494-4133-8CA6-0733CDB4CC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99BF6-11C0-448C-91B2-F03690CE9089", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "61348305-FC9B-4DB4-B039-0A08D44812EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C8CE8BC-05D9-45D3-A645-D1A081E1A555", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6DC1BA1F-1210-4FBE-B218-B9FDC4711AE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "5539C19B-97D1-44C3-8883-0343B574133D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "99A1A830-0F70-47D7-89D5-7B50F69C6312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "43F1FCD5-4BC8-4051-982E-7112F5A128C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "B71B1E3F-F7DE-4B0A-8304-0980B6EDB776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "79F12DFE-4241-4D0B-A0BC-F022B6995921", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "383C020A-F8FD-48F9-8F82-1CDE8620D6E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6213B8E5-3E2E-43F0-A0ED-72EC414C39B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0CEE2D4D-5627-4DD5-B8A5-88B0A8440CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CE3F4194-12F3-4379-AC7E-7BB6BFD4A76B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A4DFF375-C9E5-40A9-9167-9DADE291763B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3A36C9D3-4CD6-4708-A721-4CA905306617", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7A0C39EC-75DC-4ECF-8012-C3062375836A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5A03BB26-A344-498B-8FE4-3D027EFC6606", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "E4DF1BAD-EFCF-4723-AAB5-B2733992659C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "CC474FF5-E3BE-4B81-B5AC-1D32A44C259F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "A5910845-D601-4503-82CC-49D8A11F4B31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "9F5FECB4-41D4-4FDF-8693-7FF1D51CF1D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "1DE7FBF1-11F4-4B36-BFD2-041A14E70360", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "4750C422-7D8B-45CC-BD33-35D9BE5FFBC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "40902BFF-81A9-4CFC-9FC1-61F353DEFDF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EA80139-B632-4108-BB44-41A4ABA41F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "0C17CE07-41E0-4115-AC82-5C697DA8C5C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E07888E-FEC4-43F2-90D1-91665606BD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "B338AFCE-9219-4F70-A08A-A9E6E0E967EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "A00ADE78-233F-4284-AC67-4606306D7EC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "664F445F-91A3-4AE9-8D60-76C656402EB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "01C90ED8-03B2-4FF8-9C8E-8340A5E8E13B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "557AB540-0F7F-4F54-9BCD-9103217C923E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "AA7F2FC6-F13E-445D-B2B6-01A7019F90F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7AAE28E-65DE-425A-917E-549DC1D0DFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "91CA984F-F579-421C-9A11-DCBE731A49FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "33E8C022-40EE-4B36-B7ED-3E51CBB1AB9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "26CD8F90-6BA8-466F-92D9-FFC264574F77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "FC42A543-F2BB-4FFF-9674-61D01F3406DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "BBEE1D3B-1D22-4024-9191-56B2615F8ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "A402AB90-03C8-4B5B-AEF9-CDAC023DA6D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "F865F54F-E4D6-4B92-9644-992A44F7D562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "91AC5D05-728E-49A8-8A75-2CF97FAFD68D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "D82F96CC-94E9-46C5-B886-CD63B2060145", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "EC425B75-5584-4184-BEC0-44FAD8B431DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "B9B992F2-43D5-4FBF-A94A-EA8E8B0EBB01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "A660B64F-2CF8-48C3-877E-B583E1CFC0FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55476CAD-BDB3-46CB-95A0-74BA8F49A5D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A89E5621-BA1F-450C-8E82-FC4764B54905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6B4DF0F5-853A-430E-8C93-556D4FF29C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "109BC8D1-E547-45C4-99AA-C74495F8E8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "67F823CE-90D6-4914-B125-88B6F868808D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "53551C1A-9DBD-4E5E-8FA7-C04EE2A38D20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CC2360AC-5C88-4F8B-9BC8-48FBA716CFBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F4C3D1D3-034B-4B6E-BC78-050D22A3D84E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "15271254-5905-4D08-BD9E-08F841AA29D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5AB609CB-934B-43E4-A884-FDC7B58D0560", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "70B52828-6B38-4561-9D79-83DD8EC294A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "9DDE7B4C-CF8F-4CE6-AD3F-CE74377D4077", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "523B6515-33AE-4606-A7D6-C698D26659D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "42A388D2-AE67-4B5E-AFEF-32F7834652E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "B30845DA-3C00-4567-B590-61BAC547B312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "D28A6411-627C-46BE-9D59-3519B3816BD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "00659549-4B19-4B16-8DBD-71627453A1EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "3724D315-5DCD-4378-85F1-1880C535317C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "45F4AF99-6774-4EF4-BD0C-64FE18FC3B46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado de nivel de administrador ejecute c\u00f3digo arbitrario como usuario ra\u00edz. Para aprovechar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario en la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes HTTP manipuladas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente como usuario ra\u00edz." } ], "id": "CVE-2024-20520", "lastModified": "2024-10-08T13:50:48.337", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:19.050", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar c\u00f3digo arbitrario sobre un dispositivo afectado. Las vulnerabilidades son debido a restricciones de l\u00edmite insuficientes en la entrada suministrada por el usuario para scripts en la interfaz de administraci\u00f3n basada en web. Un atacante con privilegios administrativos que sean suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones dise\u00f1adas que contienen valores demasiado grandes hacia un dispositivo afectado, causando un desbordamiento de la pila. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo se bloquee o permitir al atacante ejecutar c\u00f3digo arbitrario con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3294", "lastModified": "2024-11-21T05:30:45.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:13.417", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | - | |
cisco | rv016 | - | |
cisco | rv042_firmware | - | |
cisco | rv042 | - | |
cisco | rv042g_firmware | - | |
cisco | rv042g | - | |
cisco | rv082_firmware | - | |
cisco | rv082 | - | |
cisco | rv320_firmware | - | |
cisco | rv320 | - | |
cisco | rv325_firmware | - | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCC05438-3064-4FB6-9177-9EA60C8E250C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5A39236-B032-46BB-94D0-3E0E3E557BC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E699C11F-3C7C-420D-9243-5CD2A6B98EF2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF65E38-D812-4F6E-903C-05E203F3E9F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C17C5F-4EB7-4859-8127-AE027A72CB2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69F1C458-0EF3-4AD6-9055-355711F3751E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20148", "lastModified": "2024-11-21T07:40:39.913", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:09.220", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 13:44
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA9B2E23-F7F6-44C8-8800-CB3FAECBCDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "F445CE1E-CACF-4906-814D-3658EB5B8A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "987844EB-3E48-49DF-A95C-054D95F36F4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "54A716D3-2E68-4348-A42C-7ACB51107903", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F7458A81-C907-482C-889B-2DE32C1A9238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AAFC3C16-C6B4-4311-92C9-AB96BA91F8E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "CC353BA2-BCFC-44D1-A190-EFAC646E7D48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "C0466119-31BE-44AD-82A4-66C1315C128A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "62330002-CB84-434C-860A-A4C29B4C29C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "36A0F1E3-8FCA-4ED1-A6F1-FDC9D3F3E538", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "09CBB296-950D-42A1-B6F6-10EDF56AE763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F47C5A1E-5162-48E8-998C-5A452C86688E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C5E33427-60ED-4E42-A821-462A87BBEF53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B1A3E3E5-8B9F-4C15-A3B8-538202A60429", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "CFE2DAFE-F2A4-43A7-BAB5-053FE1D7BD30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "CD25C358-C310-41C1-AFA5-89E54D5012CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "A995298E-9655-4AAD-8ABC-71AC816E798D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "08DD66B1-F045-4500-B098-CA65F0914107", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "88DE2217-2A37-41D2-ADFE-6648969C676A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "BBC05564-DB6D-4EED-95D0-BF3553748E50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "59693DA5-9F18-4F4C-8C57-C7294CF12EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "1FEA0358-5E6A-465F-829C-7A05B64E2EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3604DDDE-7C98-4014-B50F-8E8808245644", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "92E2E999-774D-406A-BE8F-0B5A01E1D907", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5EC63ECD-D415-4D6C-A4E3-DCF6B8878474", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "D559E798-8CD9-463A-AF03-843BB589C599", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C6D3ACE2-D67A-46B4-97E7-F8085BBBD086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7C346A18-C543-4E3B-A1A8-B7757D6D6E45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "40970E5B-AC59-4A61-BD7F-64468C882385", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "A6A12CFD-3DF8-4B40-B0D3-8FBE037D1BE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "42FA29EE-8000-486C-AEC3-01AE3DE88007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "2C32756E-FBCA-4485-8AFF-3A83570D7CDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "B066474A-AE23-48AB-A550-4F2FF3758CA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "D6306152-5BD8-4BD3-9E2D-D523DA54D497", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "3A665527-A2C9-4C10-B902-79C158DC589F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "1E99461F-4395-4A30-8B6D-2F63CA9851F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "61F75405-494A-446C-9C19-CC39E121D529", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "6BD8AED3-E2B1-46D6-8E04-C5C3E4186BB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "C03B0889-8AAA-455F-BBB5-B5BC417904B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "4FA3AF56-BF90-4F9E-9E29-1FF9D112AF3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "D46196B0-8E14-49F6-9E16-6E441D133357", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "8212115A-A2E7-4CF9-8093-0BD9162FF26F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "3D70F5D9-7F51-4782-B8B5-30A5AB569464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "36651493-4F0C-4CF6-935D-B128C9741A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF65AFA9-26CD-4114-8246-07FAB904176B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "30972BB8-A616-4021-868F-A775092B3D41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "BBF50E2F-14D7-4738-B4DF-848A3F2814FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "F11630A4-0BBE-457E-B53F-11EA4448C92F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "D92E3198-22B2-491D-9815-2AA62AB0A30E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "EA876548-8B5A-4254-B154-58BCF03ADDA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3BCD33AD-A637-4C08-AE7E-9974B86CDDE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "935EA2B1-EC2A-4B17-A563-9515579D6161", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B38C7123-D65B-4840-AC28-A530CD4ECCA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "C0E595E2-B201-4689-B05D-1C3E44876D74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "F73AC635-05BF-4476-9548-D72D32A313FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "7A734929-DF60-4B5B-8380-1BBD093C1E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "E1D6863E-2DFB-4BDD-BC3A-B94F84F51E30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "816E98BD-38C5-41CC-8736-5BFFBBA447E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "86779EB2-CF50-4CEF-8815-56C8BB517698", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FAD122DD-2FB2-4E55-A77C-7235B5501C6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "E0955403-0054-476F-A162-77CCD5C475AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "5A9C297F-5B9E-4591-94C8-5EBEFB2D8CEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7EAB2D55-EE1B-499F-B0C0-78538660985E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3001E0B0-01FD-4DFC-B195-7CE2E156F990", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0B0EDE6F-47B3-48A2-A0C3-2AEC8FFA666E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "DE455ACF-E775-4ADE-95E9-F2162FE79486", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "94D78C7E-5E5A-457F-9D79-58E123145F41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0DCC0019-F4EF-4CB7-AED1-CC84A413DB1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "4BD3AE38-E227-4B55-B492-18614D258905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "AB9D70F1-9499-480A-A53E-8FC2BA17DCDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "DC7A6DF2-C4FC-4BAA-8ABB-0B60BA0357BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "575EC78E-71EE-4657-8413-7D60F2E933C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "834D2F6A-2590-4073-A6F5-AC88A32C30DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "EC89C839-57E0-4FDD-9597-01F8795B4DB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "A119367F-2F09-4750-A8B9-F176A10A55CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "C2062E92-F6BD-4AE7-86AA-682C36E33A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "25EC7568-713E-44DD-9418-23013749CC21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "63D3656F-9D46-4F6C-B8E1-B04243BFD57B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "86DE5F2E-9B5E-4430-8B3D-97843462FE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "0DA83932-5061-4F7B-B152-E013D679C7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "AFA29437-B6C7-4C74-90F6-5CF58F54756B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "261D3EEA-6227-4136-91DD-380A2BF3635A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "64765C29-84C1-4F41-9BB4-18A0C43B197C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "44B039E2-0220-481F-B550-3358402FB390", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "BA050DDE-682E-4A54-995A-E3EDB19E45EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B48800BA-A64E-4C18-A6A5-651FFF3A18ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "EC4983FF-DA90-4F10-A511-D0C2531D8380", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "AE80F7A6-0A91-488C-BEE8-F23057AA1ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "08029110-3FE5-4DEB-AE76-2B165C4E79C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "B9779344-6BAB-4D21-8DB2-4BA9D7E55F2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "490D19A8-3494-4133-8CA6-0733CDB4CC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99BF6-11C0-448C-91B2-F03690CE9089", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "61348305-FC9B-4DB4-B039-0A08D44812EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C8CE8BC-05D9-45D3-A645-D1A081E1A555", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6DC1BA1F-1210-4FBE-B218-B9FDC4711AE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "5539C19B-97D1-44C3-8883-0343B574133D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "99A1A830-0F70-47D7-89D5-7B50F69C6312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "43F1FCD5-4BC8-4051-982E-7112F5A128C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "B71B1E3F-F7DE-4B0A-8304-0980B6EDB776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "79F12DFE-4241-4D0B-A0BC-F022B6995921", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "383C020A-F8FD-48F9-8F82-1CDE8620D6E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6213B8E5-3E2E-43F0-A0ED-72EC414C39B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0CEE2D4D-5627-4DD5-B8A5-88B0A8440CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CE3F4194-12F3-4379-AC7E-7BB6BFD4A76B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A4DFF375-C9E5-40A9-9167-9DADE291763B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3A36C9D3-4CD6-4708-A721-4CA905306617", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7A0C39EC-75DC-4ECF-8012-C3062375836A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5A03BB26-A344-498B-8FE4-3D027EFC6606", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "E4DF1BAD-EFCF-4723-AAB5-B2733992659C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "CC474FF5-E3BE-4B81-B5AC-1D32A44C259F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "A5910845-D601-4503-82CC-49D8A11F4B31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "9F5FECB4-41D4-4FDF-8693-7FF1D51CF1D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "1DE7FBF1-11F4-4B36-BFD2-041A14E70360", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "4750C422-7D8B-45CC-BD33-35D9BE5FFBC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "40902BFF-81A9-4CFC-9FC1-61F353DEFDF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EA80139-B632-4108-BB44-41A4ABA41F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "0C17CE07-41E0-4115-AC82-5C697DA8C5C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E07888E-FEC4-43F2-90D1-91665606BD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "B338AFCE-9219-4F70-A08A-A9E6E0E967EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "A00ADE78-233F-4284-AC67-4606306D7EC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "664F445F-91A3-4AE9-8D60-76C656402EB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "01C90ED8-03B2-4FF8-9C8E-8340A5E8E13B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "557AB540-0F7F-4F54-9BCD-9103217C923E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "AA7F2FC6-F13E-445D-B2B6-01A7019F90F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7AAE28E-65DE-425A-917E-549DC1D0DFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "91CA984F-F579-421C-9A11-DCBE731A49FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "33E8C022-40EE-4B36-B7ED-3E51CBB1AB9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "26CD8F90-6BA8-466F-92D9-FFC264574F77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "FC42A543-F2BB-4FFF-9674-61D01F3406DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "BBEE1D3B-1D22-4024-9191-56B2615F8ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "A402AB90-03C8-4B5B-AEF9-CDAC023DA6D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "F865F54F-E4D6-4B92-9644-992A44F7D562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "91AC5D05-728E-49A8-8A75-2CF97FAFD68D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "D82F96CC-94E9-46C5-B886-CD63B2060145", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "EC425B75-5584-4184-BEC0-44FAD8B431DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "B9B992F2-43D5-4FBF-A94A-EA8E8B0EBB01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "A660B64F-2CF8-48C3-877E-B583E1CFC0FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55476CAD-BDB3-46CB-95A0-74BA8F49A5D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A89E5621-BA1F-450C-8E82-FC4764B54905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6B4DF0F5-853A-430E-8C93-556D4FF29C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "109BC8D1-E547-45C4-99AA-C74495F8E8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "67F823CE-90D6-4914-B125-88B6F868808D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "53551C1A-9DBD-4E5E-8FA7-C04EE2A38D20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CC2360AC-5C88-4F8B-9BC8-48FBA716CFBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F4C3D1D3-034B-4B6E-BC78-050D22A3D84E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "15271254-5905-4D08-BD9E-08F841AA29D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5AB609CB-934B-43E4-A884-FDC7B58D0560", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "70B52828-6B38-4561-9D79-83DD8EC294A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "9DDE7B4C-CF8F-4CE6-AD3F-CE74377D4077", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "523B6515-33AE-4606-A7D6-C698D26659D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "42A388D2-AE67-4B5E-AFEF-32F7834652E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "B30845DA-3C00-4567-B590-61BAC547B312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "D28A6411-627C-46BE-9D59-3519B3816BD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "00659549-4B19-4B16-8DBD-71627453A1EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "3724D315-5DCD-4378-85F1-1880C535317C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "45F4AF99-6774-4EF4-BD0C-64FE18FC3B46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado, de nivel de administrador, provoque una recarga inesperada de un dispositivo afectado, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Para explotar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada del usuario que se encuentra en los paquetes HTTP entrantes. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP manipulada a la interfaz de administraci\u00f3n basada en web del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante provoque una recarga inesperada del dispositivo, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2024-20516", "lastModified": "2024-10-08T13:44:10.840", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:18.200", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-24 16:29
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv320_firmware | 1.4.2.15 | |
cisco | rv320_firmware | 1.4.2.17 | |
cisco | rv320 | - | |
cisco | rv325_firmware | 1.4.2.15 | |
cisco | rv325_firmware | 1.4.2.17 | |
cisco | rv325 | - |
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99BF6-11C0-448C-91B2-F03690CE9089", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "61348305-FC9B-4DB4-B039-0A08D44812EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "A402AB90-03C8-4B5B-AEF9-CDAC023DA6D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "F865F54F-E4D6-4B92-9644-992A44F7D562", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz web de los routers Cisco Small Business RV320 y RV325 Dual Gigabit WAN VPN podr\u00eda permitir que un atacante remoto sin autenticar recupere informaci\u00f3n sensible. Esta vulnerabilidad se debe a controles de acceso incorrectos para las URL. Un atacante podr\u00eda explotar esta vulnerabilidad conect\u00e1ndose a un dispositivo afectado mediante HTTP o HTTPS y solicitando URL espec\u00edficas. Un exploit con \u00e9xito podr\u00eda permitir al atacante descargar la configuraci\u00f3n del router o informaci\u00f3n de diagn\u00f3stico detallada. Cisco ha publicado actualizaciones de firmware que tratan esta vulnerabilidad." } ], "id": "CVE-2019-1653", "lastModified": "2024-11-21T04:37:01.223", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-24T16:29:00.317", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152260/Cisco-RV320-Unauthenticated-Configuration-Export.html" }, { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152261/Cisco-RV320-Unauthenticated-Diagnostic-Data-Retrieval.html" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html" }, { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/59" }, { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/60" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106732" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory" ], "url": "https://badpackets.net/over-9000-cisco-rv320-rv325-routers-vulnerable-to-cve-2019-1653/" }, { "source": "ykramarz@cisco.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Mar/53" }, { "source": "ykramarz@cisco.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Mar/54" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory" ], "url": "https://threatpost.com/scans-cisco-routers-code-execution/141218/" }, { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-info" }, { "source": "ykramarz@cisco.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46262/" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46655/" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=bx0RQJDlGbY" }, { "source": "ykramarz@cisco.com", "tags": [ "Third Party Advisory" ], "url": "https://www.zdnet.com/article/hackers-are-going-after-cisco-rv320rv325-routers-using-a-new-exploit/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152260/Cisco-RV320-Unauthenticated-Configuration-Export.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152261/Cisco-RV320-Unauthenticated-Diagnostic-Data-Retrieval.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/60" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106732" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://badpackets.net/over-9000-cisco-rv320-rv325-routers-vulnerable-to-cve-2019-1653/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Mar/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Mar/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://threatpost.com/scans-cisco-routers-code-execution/141218/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-info" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46262/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46655/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=bx0RQJDlGbY" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zdnet.com/article/hackers-are-going-after-cisco-rv320rv325-routers-using-a-new-exploit/" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 13:48
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA9B2E23-F7F6-44C8-8800-CB3FAECBCDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "F445CE1E-CACF-4906-814D-3658EB5B8A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "987844EB-3E48-49DF-A95C-054D95F36F4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "54A716D3-2E68-4348-A42C-7ACB51107903", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F7458A81-C907-482C-889B-2DE32C1A9238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AAFC3C16-C6B4-4311-92C9-AB96BA91F8E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "CC353BA2-BCFC-44D1-A190-EFAC646E7D48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "C0466119-31BE-44AD-82A4-66C1315C128A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "62330002-CB84-434C-860A-A4C29B4C29C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "36A0F1E3-8FCA-4ED1-A6F1-FDC9D3F3E538", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "09CBB296-950D-42A1-B6F6-10EDF56AE763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F47C5A1E-5162-48E8-998C-5A452C86688E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C5E33427-60ED-4E42-A821-462A87BBEF53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B1A3E3E5-8B9F-4C15-A3B8-538202A60429", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "CFE2DAFE-F2A4-43A7-BAB5-053FE1D7BD30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "CD25C358-C310-41C1-AFA5-89E54D5012CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "A995298E-9655-4AAD-8ABC-71AC816E798D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "08DD66B1-F045-4500-B098-CA65F0914107", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "88DE2217-2A37-41D2-ADFE-6648969C676A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "BBC05564-DB6D-4EED-95D0-BF3553748E50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "59693DA5-9F18-4F4C-8C57-C7294CF12EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "1FEA0358-5E6A-465F-829C-7A05B64E2EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3604DDDE-7C98-4014-B50F-8E8808245644", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "92E2E999-774D-406A-BE8F-0B5A01E1D907", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5EC63ECD-D415-4D6C-A4E3-DCF6B8878474", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "D559E798-8CD9-463A-AF03-843BB589C599", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C6D3ACE2-D67A-46B4-97E7-F8085BBBD086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7C346A18-C543-4E3B-A1A8-B7757D6D6E45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "40970E5B-AC59-4A61-BD7F-64468C882385", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "A6A12CFD-3DF8-4B40-B0D3-8FBE037D1BE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "42FA29EE-8000-486C-AEC3-01AE3DE88007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "2C32756E-FBCA-4485-8AFF-3A83570D7CDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "B066474A-AE23-48AB-A550-4F2FF3758CA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "D6306152-5BD8-4BD3-9E2D-D523DA54D497", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "3A665527-A2C9-4C10-B902-79C158DC589F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "1E99461F-4395-4A30-8B6D-2F63CA9851F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "61F75405-494A-446C-9C19-CC39E121D529", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "6BD8AED3-E2B1-46D6-8E04-C5C3E4186BB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "C03B0889-8AAA-455F-BBB5-B5BC417904B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "4FA3AF56-BF90-4F9E-9E29-1FF9D112AF3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "D46196B0-8E14-49F6-9E16-6E441D133357", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "8212115A-A2E7-4CF9-8093-0BD9162FF26F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "3D70F5D9-7F51-4782-B8B5-30A5AB569464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "36651493-4F0C-4CF6-935D-B128C9741A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF65AFA9-26CD-4114-8246-07FAB904176B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "30972BB8-A616-4021-868F-A775092B3D41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "BBF50E2F-14D7-4738-B4DF-848A3F2814FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "F11630A4-0BBE-457E-B53F-11EA4448C92F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "D92E3198-22B2-491D-9815-2AA62AB0A30E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "EA876548-8B5A-4254-B154-58BCF03ADDA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3BCD33AD-A637-4C08-AE7E-9974B86CDDE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "935EA2B1-EC2A-4B17-A563-9515579D6161", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B38C7123-D65B-4840-AC28-A530CD4ECCA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "C0E595E2-B201-4689-B05D-1C3E44876D74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "F73AC635-05BF-4476-9548-D72D32A313FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "7A734929-DF60-4B5B-8380-1BBD093C1E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "E1D6863E-2DFB-4BDD-BC3A-B94F84F51E30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "816E98BD-38C5-41CC-8736-5BFFBBA447E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "86779EB2-CF50-4CEF-8815-56C8BB517698", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FAD122DD-2FB2-4E55-A77C-7235B5501C6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "E0955403-0054-476F-A162-77CCD5C475AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "5A9C297F-5B9E-4591-94C8-5EBEFB2D8CEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7EAB2D55-EE1B-499F-B0C0-78538660985E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3001E0B0-01FD-4DFC-B195-7CE2E156F990", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0B0EDE6F-47B3-48A2-A0C3-2AEC8FFA666E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "DE455ACF-E775-4ADE-95E9-F2162FE79486", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "94D78C7E-5E5A-457F-9D79-58E123145F41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0DCC0019-F4EF-4CB7-AED1-CC84A413DB1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "4BD3AE38-E227-4B55-B492-18614D258905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "AB9D70F1-9499-480A-A53E-8FC2BA17DCDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "DC7A6DF2-C4FC-4BAA-8ABB-0B60BA0357BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "575EC78E-71EE-4657-8413-7D60F2E933C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "834D2F6A-2590-4073-A6F5-AC88A32C30DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "EC89C839-57E0-4FDD-9597-01F8795B4DB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "A119367F-2F09-4750-A8B9-F176A10A55CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "C2062E92-F6BD-4AE7-86AA-682C36E33A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "25EC7568-713E-44DD-9418-23013749CC21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "63D3656F-9D46-4F6C-B8E1-B04243BFD57B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "86DE5F2E-9B5E-4430-8B3D-97843462FE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "0DA83932-5061-4F7B-B152-E013D679C7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "AFA29437-B6C7-4C74-90F6-5CF58F54756B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "261D3EEA-6227-4136-91DD-380A2BF3635A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "64765C29-84C1-4F41-9BB4-18A0C43B197C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "44B039E2-0220-481F-B550-3358402FB390", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "BA050DDE-682E-4A54-995A-E3EDB19E45EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B48800BA-A64E-4C18-A6A5-651FFF3A18ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "EC4983FF-DA90-4F10-A511-D0C2531D8380", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "AE80F7A6-0A91-488C-BEE8-F23057AA1ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "08029110-3FE5-4DEB-AE76-2B165C4E79C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "B9779344-6BAB-4D21-8DB2-4BA9D7E55F2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "490D19A8-3494-4133-8CA6-0733CDB4CC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99BF6-11C0-448C-91B2-F03690CE9089", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "61348305-FC9B-4DB4-B039-0A08D44812EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C8CE8BC-05D9-45D3-A645-D1A081E1A555", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6DC1BA1F-1210-4FBE-B218-B9FDC4711AE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "5539C19B-97D1-44C3-8883-0343B574133D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "99A1A830-0F70-47D7-89D5-7B50F69C6312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "43F1FCD5-4BC8-4051-982E-7112F5A128C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "B71B1E3F-F7DE-4B0A-8304-0980B6EDB776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "79F12DFE-4241-4D0B-A0BC-F022B6995921", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "383C020A-F8FD-48F9-8F82-1CDE8620D6E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6213B8E5-3E2E-43F0-A0ED-72EC414C39B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0CEE2D4D-5627-4DD5-B8A5-88B0A8440CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CE3F4194-12F3-4379-AC7E-7BB6BFD4A76B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A4DFF375-C9E5-40A9-9167-9DADE291763B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3A36C9D3-4CD6-4708-A721-4CA905306617", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7A0C39EC-75DC-4ECF-8012-C3062375836A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5A03BB26-A344-498B-8FE4-3D027EFC6606", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "E4DF1BAD-EFCF-4723-AAB5-B2733992659C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "CC474FF5-E3BE-4B81-B5AC-1D32A44C259F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "A5910845-D601-4503-82CC-49D8A11F4B31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "9F5FECB4-41D4-4FDF-8693-7FF1D51CF1D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "1DE7FBF1-11F4-4B36-BFD2-041A14E70360", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "4750C422-7D8B-45CC-BD33-35D9BE5FFBC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "40902BFF-81A9-4CFC-9FC1-61F353DEFDF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EA80139-B632-4108-BB44-41A4ABA41F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "0C17CE07-41E0-4115-AC82-5C697DA8C5C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E07888E-FEC4-43F2-90D1-91665606BD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "B338AFCE-9219-4F70-A08A-A9E6E0E967EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "A00ADE78-233F-4284-AC67-4606306D7EC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "664F445F-91A3-4AE9-8D60-76C656402EB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "01C90ED8-03B2-4FF8-9C8E-8340A5E8E13B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "557AB540-0F7F-4F54-9BCD-9103217C923E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "AA7F2FC6-F13E-445D-B2B6-01A7019F90F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7AAE28E-65DE-425A-917E-549DC1D0DFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "91CA984F-F579-421C-9A11-DCBE731A49FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "33E8C022-40EE-4B36-B7ED-3E51CBB1AB9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "26CD8F90-6BA8-466F-92D9-FFC264574F77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "FC42A543-F2BB-4FFF-9674-61D01F3406DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "BBEE1D3B-1D22-4024-9191-56B2615F8ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "A402AB90-03C8-4B5B-AEF9-CDAC023DA6D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "F865F54F-E4D6-4B92-9644-992A44F7D562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "91AC5D05-728E-49A8-8A75-2CF97FAFD68D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "D82F96CC-94E9-46C5-B886-CD63B2060145", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "EC425B75-5584-4184-BEC0-44FAD8B431DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "B9B992F2-43D5-4FBF-A94A-EA8E8B0EBB01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "A660B64F-2CF8-48C3-877E-B583E1CFC0FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55476CAD-BDB3-46CB-95A0-74BA8F49A5D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A89E5621-BA1F-450C-8E82-FC4764B54905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6B4DF0F5-853A-430E-8C93-556D4FF29C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "109BC8D1-E547-45C4-99AA-C74495F8E8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "67F823CE-90D6-4914-B125-88B6F868808D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "53551C1A-9DBD-4E5E-8FA7-C04EE2A38D20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CC2360AC-5C88-4F8B-9BC8-48FBA716CFBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F4C3D1D3-034B-4B6E-BC78-050D22A3D84E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "15271254-5905-4D08-BD9E-08F841AA29D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5AB609CB-934B-43E4-A884-FDC7B58D0560", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "70B52828-6B38-4561-9D79-83DD8EC294A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "9DDE7B4C-CF8F-4CE6-AD3F-CE74377D4077", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "523B6515-33AE-4606-A7D6-C698D26659D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "42A388D2-AE67-4B5E-AFEF-32F7834652E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "B30845DA-3C00-4567-B590-61BAC547B312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "D28A6411-627C-46BE-9D59-3519B3816BD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "00659549-4B19-4B16-8DBD-71627453A1EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "3724D315-5DCD-4378-85F1-1880C535317C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "45F4AF99-6774-4EF4-BD0C-64FE18FC3B46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado, de nivel de administrador, provoque una recarga inesperada de un dispositivo afectado, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Para explotar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada del usuario que se encuentra en los paquetes HTTP entrantes. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP manipulada a la interfaz de administraci\u00f3n basada en web del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante provoque una recarga inesperada del dispositivo, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2024-20522", "lastModified": "2024-10-08T13:48:19.060", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:19.490", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar comandos arbitrarios sobre un dispositivo afectado. Las vulnerabilidades se presentan porque la interfaz de administraci\u00f3n basada en web no comprueba apropiadamente la entrada suministrada por el usuario para scripts. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones maliciosas hacia un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrarios con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3278", "lastModified": "2024-11-21T05:30:42.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:12.497", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-13 07:15
Modified
2024-11-21 07:40
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device.
This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device.
Cisco has not and will not release software updates that address this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | 1.5.1.13 | |
cisco | rv016_firmware | 4.2.3.08 | |
cisco | rv016 | - | |
cisco | rv042_firmware | 1.5.1.13 | |
cisco | rv042_firmware | 4.2.3.08 | |
cisco | rv042 | - | |
cisco | rv042g_firmware | 1.5.1.13 | |
cisco | rv042g_firmware | 4.2.3.08 | |
cisco | rv042g | - | |
cisco | rv082_firmware | 1.5.1.13 | |
cisco | rv082_firmware | 4.2.3.08 | |
cisco | rv082 | - | |
cisco | rv320_firmware | 1.5.1.13 | |
cisco | rv320_firmware | 4.2.3.08 | |
cisco | rv320 | - | |
cisco | rv325_firmware | 1.5.1.13 | |
cisco | rv325_firmware | 4.2.3.08 | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "54F4D39E-DA7A-4B04-B6E5-0C7988588640", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv016_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "2368A32B-7EB2-4FC0-B01B-64798BB3F1EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "59693DA5-9F18-4F4C-8C57-C7294CF12EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "1E99461F-4395-4A30-8B6D-2F63CA9851F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FAD122DD-2FB2-4E55-A77C-7235B5501C6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "A119367F-2F09-4750-A8B9-F176A10A55CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "36C05CAC-0969-4EDC-80F6-494B0E4EDCF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv082_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "B7203F5C-F24C-43FE-968D-FD4FD967EDC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "B71B1E3F-F7DE-4B0A-8304-0980B6EDB776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "4750C422-7D8B-45CC-BD33-35D9BE5FFBC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55476CAD-BDB3-46CB-95A0-74BA8F49A5D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "D28A6411-627C-46BE-9D59-3519B3816BD7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device.\r\n\r This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device.\r\n\r Cisco has not and will not release software updates that address this vulnerability." } ], "id": "CVE-2023-20118", "lastModified": "2024-11-21T07:40:35.883", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-13T07:15:21.080", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar comandos arbitrarios sobre un dispositivo afectado. Las vulnerabilidades se presentan porque la interfaz de administraci\u00f3n basada en web no comprueba apropiadamente la entrada suministrada por el usuario para scripts. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones maliciosas hacia un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrarios con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3276", "lastModified": "2024-11-21T05:30:42.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:12.340", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar c\u00f3digo arbitrario sobre un dispositivo afectado. Las vulnerabilidades son debido a restricciones de l\u00edmite insuficientes en la entrada suministrada por el usuario para scripts en la interfaz de administraci\u00f3n basada en web. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones dise\u00f1adas que contienen valores demasiado grandes hacia un dispositivo afectado, causando un desbordamiento de la pila. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo se bloquee o permitir al atacante ejecutar c\u00f3digo arbitrario con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3289", "lastModified": "2024-11-21T05:30:44.080", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:12.997", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 18:15
Modified
2024-11-21 07:40
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as the root user on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates to address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv320_firmware | - | |
cisco | rv320 | - | |
cisco | rv325_firmware | - | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C17C5F-4EB7-4859-8127-AE027A72CB2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69F1C458-0EF3-4AD6-9055-355711F3751E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as the root user on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates to address these vulnerabilities." } ], "id": "CVE-2023-20128", "lastModified": "2024-11-21T07:40:37.353", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T18:15:07.687", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv32x-cmdinject-cKQsZpxL" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv32x-cmdinject-cKQsZpxL" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-146" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar c\u00f3digo arbitrario sobre un dispositivo afectado. Las vulnerabilidades son debido a restricciones de l\u00edmite insuficientes en la entrada suministrada por el usuario para scripts en la interfaz de administraci\u00f3n basada en web. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones dise\u00f1adas que contienen valores demasiado grandes hacia un dispositivo afectado, causando un desbordamiento de la pila. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo se bloquee o permitir al atacante ejecutar c\u00f3digo arbitrario con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3292", "lastModified": "2024-11-21T05:30:44.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:13.247", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar c\u00f3digo arbitrario sobre un dispositivo afectado. Las vulnerabilidades son debido a restricciones de l\u00edmite insuficientes en la entrada suministrada por el usuario para scripts en la interfaz de administraci\u00f3n basada en web. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones dise\u00f1adas que contienen valores demasiado grandes hacia un dispositivo afectado, causando un desbordamiento de la pila. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo se bloquee o permitir al atacante ejecutar c\u00f3digo arbitrario con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3291", "lastModified": "2024-11-21T05:30:44.317", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:13.167", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E1462E9-4464-492C-8B91-6E020B9DCB23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E01122-CD88-4096-958A-8699B2A3DC3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A620D1C-1FBB-46C9-9904-1FC6342ED85E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDB4B5-9528-43CE-B8E6-B509EFCD11BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EA568A8-286F-4588-B946-6F9C97E08BCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3B7DECE-18C4-45AE-AF5C-657A4795C7F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20141", "lastModified": "2024-11-21T07:40:38.993", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:08.877", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 13:50
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA9B2E23-F7F6-44C8-8800-CB3FAECBCDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "F445CE1E-CACF-4906-814D-3658EB5B8A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "987844EB-3E48-49DF-A95C-054D95F36F4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "54A716D3-2E68-4348-A42C-7ACB51107903", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F7458A81-C907-482C-889B-2DE32C1A9238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AAFC3C16-C6B4-4311-92C9-AB96BA91F8E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "CC353BA2-BCFC-44D1-A190-EFAC646E7D48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "C0466119-31BE-44AD-82A4-66C1315C128A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "62330002-CB84-434C-860A-A4C29B4C29C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "36A0F1E3-8FCA-4ED1-A6F1-FDC9D3F3E538", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "09CBB296-950D-42A1-B6F6-10EDF56AE763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F47C5A1E-5162-48E8-998C-5A452C86688E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C5E33427-60ED-4E42-A821-462A87BBEF53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B1A3E3E5-8B9F-4C15-A3B8-538202A60429", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "CFE2DAFE-F2A4-43A7-BAB5-053FE1D7BD30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "CD25C358-C310-41C1-AFA5-89E54D5012CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "A995298E-9655-4AAD-8ABC-71AC816E798D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "08DD66B1-F045-4500-B098-CA65F0914107", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "88DE2217-2A37-41D2-ADFE-6648969C676A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "BBC05564-DB6D-4EED-95D0-BF3553748E50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "59693DA5-9F18-4F4C-8C57-C7294CF12EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "1FEA0358-5E6A-465F-829C-7A05B64E2EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3604DDDE-7C98-4014-B50F-8E8808245644", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "92E2E999-774D-406A-BE8F-0B5A01E1D907", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5EC63ECD-D415-4D6C-A4E3-DCF6B8878474", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "D559E798-8CD9-463A-AF03-843BB589C599", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C6D3ACE2-D67A-46B4-97E7-F8085BBBD086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7C346A18-C543-4E3B-A1A8-B7757D6D6E45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "40970E5B-AC59-4A61-BD7F-64468C882385", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "A6A12CFD-3DF8-4B40-B0D3-8FBE037D1BE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "42FA29EE-8000-486C-AEC3-01AE3DE88007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "2C32756E-FBCA-4485-8AFF-3A83570D7CDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "B066474A-AE23-48AB-A550-4F2FF3758CA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "D6306152-5BD8-4BD3-9E2D-D523DA54D497", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "3A665527-A2C9-4C10-B902-79C158DC589F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "1E99461F-4395-4A30-8B6D-2F63CA9851F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "61F75405-494A-446C-9C19-CC39E121D529", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "6BD8AED3-E2B1-46D6-8E04-C5C3E4186BB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "C03B0889-8AAA-455F-BBB5-B5BC417904B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "4FA3AF56-BF90-4F9E-9E29-1FF9D112AF3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "D46196B0-8E14-49F6-9E16-6E441D133357", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "8212115A-A2E7-4CF9-8093-0BD9162FF26F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "3D70F5D9-7F51-4782-B8B5-30A5AB569464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "36651493-4F0C-4CF6-935D-B128C9741A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF65AFA9-26CD-4114-8246-07FAB904176B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "30972BB8-A616-4021-868F-A775092B3D41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "BBF50E2F-14D7-4738-B4DF-848A3F2814FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "F11630A4-0BBE-457E-B53F-11EA4448C92F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "D92E3198-22B2-491D-9815-2AA62AB0A30E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "EA876548-8B5A-4254-B154-58BCF03ADDA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3BCD33AD-A637-4C08-AE7E-9974B86CDDE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "935EA2B1-EC2A-4B17-A563-9515579D6161", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B38C7123-D65B-4840-AC28-A530CD4ECCA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "C0E595E2-B201-4689-B05D-1C3E44876D74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "F73AC635-05BF-4476-9548-D72D32A313FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "7A734929-DF60-4B5B-8380-1BBD093C1E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "E1D6863E-2DFB-4BDD-BC3A-B94F84F51E30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "816E98BD-38C5-41CC-8736-5BFFBBA447E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "86779EB2-CF50-4CEF-8815-56C8BB517698", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FAD122DD-2FB2-4E55-A77C-7235B5501C6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "E0955403-0054-476F-A162-77CCD5C475AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "5A9C297F-5B9E-4591-94C8-5EBEFB2D8CEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7EAB2D55-EE1B-499F-B0C0-78538660985E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3001E0B0-01FD-4DFC-B195-7CE2E156F990", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0B0EDE6F-47B3-48A2-A0C3-2AEC8FFA666E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "DE455ACF-E775-4ADE-95E9-F2162FE79486", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "94D78C7E-5E5A-457F-9D79-58E123145F41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0DCC0019-F4EF-4CB7-AED1-CC84A413DB1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "4BD3AE38-E227-4B55-B492-18614D258905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "AB9D70F1-9499-480A-A53E-8FC2BA17DCDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "DC7A6DF2-C4FC-4BAA-8ABB-0B60BA0357BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "575EC78E-71EE-4657-8413-7D60F2E933C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "834D2F6A-2590-4073-A6F5-AC88A32C30DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "EC89C839-57E0-4FDD-9597-01F8795B4DB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "A119367F-2F09-4750-A8B9-F176A10A55CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "C2062E92-F6BD-4AE7-86AA-682C36E33A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "25EC7568-713E-44DD-9418-23013749CC21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "63D3656F-9D46-4F6C-B8E1-B04243BFD57B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "86DE5F2E-9B5E-4430-8B3D-97843462FE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "0DA83932-5061-4F7B-B152-E013D679C7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "AFA29437-B6C7-4C74-90F6-5CF58F54756B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "261D3EEA-6227-4136-91DD-380A2BF3635A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "64765C29-84C1-4F41-9BB4-18A0C43B197C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "44B039E2-0220-481F-B550-3358402FB390", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "BA050DDE-682E-4A54-995A-E3EDB19E45EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B48800BA-A64E-4C18-A6A5-651FFF3A18ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "EC4983FF-DA90-4F10-A511-D0C2531D8380", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "AE80F7A6-0A91-488C-BEE8-F23057AA1ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "08029110-3FE5-4DEB-AE76-2B165C4E79C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "B9779344-6BAB-4D21-8DB2-4BA9D7E55F2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "490D19A8-3494-4133-8CA6-0733CDB4CC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99BF6-11C0-448C-91B2-F03690CE9089", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "61348305-FC9B-4DB4-B039-0A08D44812EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C8CE8BC-05D9-45D3-A645-D1A081E1A555", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6DC1BA1F-1210-4FBE-B218-B9FDC4711AE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "5539C19B-97D1-44C3-8883-0343B574133D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "99A1A830-0F70-47D7-89D5-7B50F69C6312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "43F1FCD5-4BC8-4051-982E-7112F5A128C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "B71B1E3F-F7DE-4B0A-8304-0980B6EDB776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "79F12DFE-4241-4D0B-A0BC-F022B6995921", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "383C020A-F8FD-48F9-8F82-1CDE8620D6E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6213B8E5-3E2E-43F0-A0ED-72EC414C39B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0CEE2D4D-5627-4DD5-B8A5-88B0A8440CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CE3F4194-12F3-4379-AC7E-7BB6BFD4A76B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A4DFF375-C9E5-40A9-9167-9DADE291763B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3A36C9D3-4CD6-4708-A721-4CA905306617", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7A0C39EC-75DC-4ECF-8012-C3062375836A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5A03BB26-A344-498B-8FE4-3D027EFC6606", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "E4DF1BAD-EFCF-4723-AAB5-B2733992659C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "CC474FF5-E3BE-4B81-B5AC-1D32A44C259F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "A5910845-D601-4503-82CC-49D8A11F4B31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "9F5FECB4-41D4-4FDF-8693-7FF1D51CF1D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "1DE7FBF1-11F4-4B36-BFD2-041A14E70360", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "4750C422-7D8B-45CC-BD33-35D9BE5FFBC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "40902BFF-81A9-4CFC-9FC1-61F353DEFDF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EA80139-B632-4108-BB44-41A4ABA41F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "0C17CE07-41E0-4115-AC82-5C697DA8C5C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E07888E-FEC4-43F2-90D1-91665606BD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "B338AFCE-9219-4F70-A08A-A9E6E0E967EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "A00ADE78-233F-4284-AC67-4606306D7EC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "664F445F-91A3-4AE9-8D60-76C656402EB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "01C90ED8-03B2-4FF8-9C8E-8340A5E8E13B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "557AB540-0F7F-4F54-9BCD-9103217C923E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "AA7F2FC6-F13E-445D-B2B6-01A7019F90F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7AAE28E-65DE-425A-917E-549DC1D0DFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "91CA984F-F579-421C-9A11-DCBE731A49FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "33E8C022-40EE-4B36-B7ED-3E51CBB1AB9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "26CD8F90-6BA8-466F-92D9-FFC264574F77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "FC42A543-F2BB-4FFF-9674-61D01F3406DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "BBEE1D3B-1D22-4024-9191-56B2615F8ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "A402AB90-03C8-4B5B-AEF9-CDAC023DA6D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "F865F54F-E4D6-4B92-9644-992A44F7D562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "91AC5D05-728E-49A8-8A75-2CF97FAFD68D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "D82F96CC-94E9-46C5-B886-CD63B2060145", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "EC425B75-5584-4184-BEC0-44FAD8B431DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "B9B992F2-43D5-4FBF-A94A-EA8E8B0EBB01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "A660B64F-2CF8-48C3-877E-B583E1CFC0FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55476CAD-BDB3-46CB-95A0-74BA8F49A5D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A89E5621-BA1F-450C-8E82-FC4764B54905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6B4DF0F5-853A-430E-8C93-556D4FF29C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "109BC8D1-E547-45C4-99AA-C74495F8E8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "67F823CE-90D6-4914-B125-88B6F868808D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "53551C1A-9DBD-4E5E-8FA7-C04EE2A38D20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CC2360AC-5C88-4F8B-9BC8-48FBA716CFBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F4C3D1D3-034B-4B6E-BC78-050D22A3D84E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "15271254-5905-4D08-BD9E-08F841AA29D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5AB609CB-934B-43E4-A884-FDC7B58D0560", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "70B52828-6B38-4561-9D79-83DD8EC294A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "9DDE7B4C-CF8F-4CE6-AD3F-CE74377D4077", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "523B6515-33AE-4606-A7D6-C698D26659D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "42A388D2-AE67-4B5E-AFEF-32F7834652E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "B30845DA-3C00-4567-B590-61BAC547B312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "D28A6411-627C-46BE-9D59-3519B3816BD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "00659549-4B19-4B16-8DBD-71627453A1EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "3724D315-5DCD-4378-85F1-1880C535317C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "45F4AF99-6774-4EF4-BD0C-64FE18FC3B46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado de nivel de administrador ejecute c\u00f3digo arbitrario como usuario ra\u00edz. Para aprovechar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario en la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes HTTP manipuladas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente como usuario ra\u00edz." } ], "id": "CVE-2024-20518", "lastModified": "2024-10-08T13:50:14.730", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:18.637", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 13:50
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA9B2E23-F7F6-44C8-8800-CB3FAECBCDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "F445CE1E-CACF-4906-814D-3658EB5B8A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "987844EB-3E48-49DF-A95C-054D95F36F4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "54A716D3-2E68-4348-A42C-7ACB51107903", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F7458A81-C907-482C-889B-2DE32C1A9238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AAFC3C16-C6B4-4311-92C9-AB96BA91F8E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "CC353BA2-BCFC-44D1-A190-EFAC646E7D48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "C0466119-31BE-44AD-82A4-66C1315C128A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "62330002-CB84-434C-860A-A4C29B4C29C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "36A0F1E3-8FCA-4ED1-A6F1-FDC9D3F3E538", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "09CBB296-950D-42A1-B6F6-10EDF56AE763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F47C5A1E-5162-48E8-998C-5A452C86688E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C5E33427-60ED-4E42-A821-462A87BBEF53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B1A3E3E5-8B9F-4C15-A3B8-538202A60429", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "CFE2DAFE-F2A4-43A7-BAB5-053FE1D7BD30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "CD25C358-C310-41C1-AFA5-89E54D5012CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "A995298E-9655-4AAD-8ABC-71AC816E798D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "08DD66B1-F045-4500-B098-CA65F0914107", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "88DE2217-2A37-41D2-ADFE-6648969C676A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "BBC05564-DB6D-4EED-95D0-BF3553748E50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "59693DA5-9F18-4F4C-8C57-C7294CF12EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "1FEA0358-5E6A-465F-829C-7A05B64E2EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3604DDDE-7C98-4014-B50F-8E8808245644", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "92E2E999-774D-406A-BE8F-0B5A01E1D907", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5EC63ECD-D415-4D6C-A4E3-DCF6B8878474", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "D559E798-8CD9-463A-AF03-843BB589C599", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C6D3ACE2-D67A-46B4-97E7-F8085BBBD086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7C346A18-C543-4E3B-A1A8-B7757D6D6E45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "40970E5B-AC59-4A61-BD7F-64468C882385", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "A6A12CFD-3DF8-4B40-B0D3-8FBE037D1BE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "42FA29EE-8000-486C-AEC3-01AE3DE88007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "2C32756E-FBCA-4485-8AFF-3A83570D7CDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "B066474A-AE23-48AB-A550-4F2FF3758CA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "D6306152-5BD8-4BD3-9E2D-D523DA54D497", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "3A665527-A2C9-4C10-B902-79C158DC589F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "1E99461F-4395-4A30-8B6D-2F63CA9851F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "61F75405-494A-446C-9C19-CC39E121D529", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "6BD8AED3-E2B1-46D6-8E04-C5C3E4186BB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "C03B0889-8AAA-455F-BBB5-B5BC417904B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "4FA3AF56-BF90-4F9E-9E29-1FF9D112AF3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "D46196B0-8E14-49F6-9E16-6E441D133357", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "8212115A-A2E7-4CF9-8093-0BD9162FF26F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "3D70F5D9-7F51-4782-B8B5-30A5AB569464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "36651493-4F0C-4CF6-935D-B128C9741A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF65AFA9-26CD-4114-8246-07FAB904176B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "30972BB8-A616-4021-868F-A775092B3D41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "BBF50E2F-14D7-4738-B4DF-848A3F2814FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "F11630A4-0BBE-457E-B53F-11EA4448C92F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "D92E3198-22B2-491D-9815-2AA62AB0A30E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "EA876548-8B5A-4254-B154-58BCF03ADDA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3BCD33AD-A637-4C08-AE7E-9974B86CDDE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "935EA2B1-EC2A-4B17-A563-9515579D6161", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B38C7123-D65B-4840-AC28-A530CD4ECCA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "C0E595E2-B201-4689-B05D-1C3E44876D74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "F73AC635-05BF-4476-9548-D72D32A313FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "7A734929-DF60-4B5B-8380-1BBD093C1E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "E1D6863E-2DFB-4BDD-BC3A-B94F84F51E30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "816E98BD-38C5-41CC-8736-5BFFBBA447E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "86779EB2-CF50-4CEF-8815-56C8BB517698", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FAD122DD-2FB2-4E55-A77C-7235B5501C6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "E0955403-0054-476F-A162-77CCD5C475AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "5A9C297F-5B9E-4591-94C8-5EBEFB2D8CEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7EAB2D55-EE1B-499F-B0C0-78538660985E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3001E0B0-01FD-4DFC-B195-7CE2E156F990", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0B0EDE6F-47B3-48A2-A0C3-2AEC8FFA666E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "DE455ACF-E775-4ADE-95E9-F2162FE79486", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "94D78C7E-5E5A-457F-9D79-58E123145F41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0DCC0019-F4EF-4CB7-AED1-CC84A413DB1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "4BD3AE38-E227-4B55-B492-18614D258905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "AB9D70F1-9499-480A-A53E-8FC2BA17DCDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "DC7A6DF2-C4FC-4BAA-8ABB-0B60BA0357BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "575EC78E-71EE-4657-8413-7D60F2E933C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "834D2F6A-2590-4073-A6F5-AC88A32C30DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "EC89C839-57E0-4FDD-9597-01F8795B4DB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "A119367F-2F09-4750-A8B9-F176A10A55CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "C2062E92-F6BD-4AE7-86AA-682C36E33A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "25EC7568-713E-44DD-9418-23013749CC21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "63D3656F-9D46-4F6C-B8E1-B04243BFD57B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "86DE5F2E-9B5E-4430-8B3D-97843462FE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "0DA83932-5061-4F7B-B152-E013D679C7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "AFA29437-B6C7-4C74-90F6-5CF58F54756B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "261D3EEA-6227-4136-91DD-380A2BF3635A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "64765C29-84C1-4F41-9BB4-18A0C43B197C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "44B039E2-0220-481F-B550-3358402FB390", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "BA050DDE-682E-4A54-995A-E3EDB19E45EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B48800BA-A64E-4C18-A6A5-651FFF3A18ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "EC4983FF-DA90-4F10-A511-D0C2531D8380", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "AE80F7A6-0A91-488C-BEE8-F23057AA1ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "08029110-3FE5-4DEB-AE76-2B165C4E79C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "B9779344-6BAB-4D21-8DB2-4BA9D7E55F2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "490D19A8-3494-4133-8CA6-0733CDB4CC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99BF6-11C0-448C-91B2-F03690CE9089", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "61348305-FC9B-4DB4-B039-0A08D44812EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C8CE8BC-05D9-45D3-A645-D1A081E1A555", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6DC1BA1F-1210-4FBE-B218-B9FDC4711AE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "5539C19B-97D1-44C3-8883-0343B574133D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "99A1A830-0F70-47D7-89D5-7B50F69C6312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "43F1FCD5-4BC8-4051-982E-7112F5A128C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "B71B1E3F-F7DE-4B0A-8304-0980B6EDB776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "79F12DFE-4241-4D0B-A0BC-F022B6995921", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "383C020A-F8FD-48F9-8F82-1CDE8620D6E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6213B8E5-3E2E-43F0-A0ED-72EC414C39B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0CEE2D4D-5627-4DD5-B8A5-88B0A8440CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CE3F4194-12F3-4379-AC7E-7BB6BFD4A76B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A4DFF375-C9E5-40A9-9167-9DADE291763B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3A36C9D3-4CD6-4708-A721-4CA905306617", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7A0C39EC-75DC-4ECF-8012-C3062375836A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5A03BB26-A344-498B-8FE4-3D027EFC6606", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "E4DF1BAD-EFCF-4723-AAB5-B2733992659C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "CC474FF5-E3BE-4B81-B5AC-1D32A44C259F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "A5910845-D601-4503-82CC-49D8A11F4B31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "9F5FECB4-41D4-4FDF-8693-7FF1D51CF1D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "1DE7FBF1-11F4-4B36-BFD2-041A14E70360", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "4750C422-7D8B-45CC-BD33-35D9BE5FFBC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "40902BFF-81A9-4CFC-9FC1-61F353DEFDF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EA80139-B632-4108-BB44-41A4ABA41F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "0C17CE07-41E0-4115-AC82-5C697DA8C5C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E07888E-FEC4-43F2-90D1-91665606BD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "B338AFCE-9219-4F70-A08A-A9E6E0E967EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "A00ADE78-233F-4284-AC67-4606306D7EC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "664F445F-91A3-4AE9-8D60-76C656402EB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "01C90ED8-03B2-4FF8-9C8E-8340A5E8E13B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "557AB540-0F7F-4F54-9BCD-9103217C923E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "AA7F2FC6-F13E-445D-B2B6-01A7019F90F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7AAE28E-65DE-425A-917E-549DC1D0DFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "91CA984F-F579-421C-9A11-DCBE731A49FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "33E8C022-40EE-4B36-B7ED-3E51CBB1AB9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "26CD8F90-6BA8-466F-92D9-FFC264574F77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "FC42A543-F2BB-4FFF-9674-61D01F3406DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "BBEE1D3B-1D22-4024-9191-56B2615F8ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "A402AB90-03C8-4B5B-AEF9-CDAC023DA6D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "F865F54F-E4D6-4B92-9644-992A44F7D562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "91AC5D05-728E-49A8-8A75-2CF97FAFD68D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "D82F96CC-94E9-46C5-B886-CD63B2060145", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "EC425B75-5584-4184-BEC0-44FAD8B431DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "B9B992F2-43D5-4FBF-A94A-EA8E8B0EBB01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "A660B64F-2CF8-48C3-877E-B583E1CFC0FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55476CAD-BDB3-46CB-95A0-74BA8F49A5D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A89E5621-BA1F-450C-8E82-FC4764B54905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6B4DF0F5-853A-430E-8C93-556D4FF29C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "109BC8D1-E547-45C4-99AA-C74495F8E8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "67F823CE-90D6-4914-B125-88B6F868808D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "53551C1A-9DBD-4E5E-8FA7-C04EE2A38D20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CC2360AC-5C88-4F8B-9BC8-48FBA716CFBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F4C3D1D3-034B-4B6E-BC78-050D22A3D84E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "15271254-5905-4D08-BD9E-08F841AA29D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5AB609CB-934B-43E4-A884-FDC7B58D0560", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "70B52828-6B38-4561-9D79-83DD8EC294A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "9DDE7B4C-CF8F-4CE6-AD3F-CE74377D4077", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "523B6515-33AE-4606-A7D6-C698D26659D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "42A388D2-AE67-4B5E-AFEF-32F7834652E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "B30845DA-3C00-4567-B590-61BAC547B312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "D28A6411-627C-46BE-9D59-3519B3816BD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "00659549-4B19-4B16-8DBD-71627453A1EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "3724D315-5DCD-4378-85F1-1880C535317C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "45F4AF99-6774-4EF4-BD0C-64FE18FC3B46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado de nivel de administrador ejecute c\u00f3digo arbitrario como usuario ra\u00edz. Para aprovechar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario en la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes HTTP manipuladas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente como usuario ra\u00edz." } ], "id": "CVE-2024-20519", "lastModified": "2024-10-08T13:50:35.507", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:18.837", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082 podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar comandos arbitrarios sobre un dispositivo afectado. Las vulnerabilidades se presentan porque la interfaz de administraci\u00f3n basada en web no comprueba apropiadamente la entrada suministrada por el usuario para scripts. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones maliciosas hacia un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrarios con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3275", "lastModified": "2024-11-21T05:30:42.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:12.260", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar c\u00f3digo arbitrario sobre un dispositivo afectado. Las vulnerabilidades son debido a restricciones de l\u00edmite insuficientes en la entrada suministrada por el usuario para scripts en la interfaz de administraci\u00f3n basada en web. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones dise\u00f1adas que contienen valores demasiado grandes hacia un dispositivo afectado, causando un desbordamiento de la pila. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo se bloquee o permitir al atacante ejecutar c\u00f3digo arbitrario con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3290", "lastModified": "2024-11-21T05:30:44.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:13.073", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E1462E9-4464-492C-8B91-6E020B9DCB23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E01122-CD88-4096-958A-8699B2A3DC3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A620D1C-1FBB-46C9-9904-1FC6342ED85E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDB4B5-9528-43CE-B8E6-B509EFCD11BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EA568A8-286F-4588-B946-6F9C97E08BCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3B7DECE-18C4-45AE-AF5C-657A4795C7F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20139", "lastModified": "2024-11-21T07:40:38.747", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:08.780", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar c\u00f3digo arbitrario sobre un dispositivo afectado. Las vulnerabilidades son debido a restricciones de l\u00edmite insuficientes en la entrada suministrada por el usuario para scripts en la interfaz de administraci\u00f3n basada en web. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones dise\u00f1adas que contienen valores demasiado grandes hacia un dispositivo afectado, causando un desbordamiento de la pila. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo se bloquee o permitir al atacante ejecutar c\u00f3digo arbitrario con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3287", "lastModified": "2024-11-21T05:30:43.827", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:12.823", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Cisco Small Business RV320 y RV325 Series Routers y Cisco Small Business RV016, RV042, y RV082 Routers podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar comandos arbitrarios sobre un dispositivo afectado. Las vulnerabilidades se presentan porque la interfaz de administraci\u00f3n basada en web no comprueba apropiadamente una entrada suministrada por el usuario para scripts. Un atacante con privilegios administrativos que son suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones maliciosas hacia un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos arbitrarios con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3274", "lastModified": "2024-11-21T05:30:42.173", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:12.167", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-18 03:15
Modified
2024-11-21 05:30
Severity ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B28584-394E-412D-9B2C-6B338081D102", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F194C6-D0C6-46A7-AD6E-2678515365EF", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B7DB7-F3E1-4BAA-BE5C-53C2F90CB05A", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACA4991-A60B-42CD-8A84-B1F8825812D6", "versionEndIncluding": "4.2.3.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6636D92B-B33D-4230-8E32-20B06F26FF8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21EA1744-09E9-488D-B799-9AFBB6363C8F", "versionEndIncluding": "1.5.1.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la interfaz de administraci\u00f3n basada en web de Routers Cisco Small Business RV320 y RV325 Series y Routers Cisco Small Business RV016, RV042, y RV082, podr\u00edan permitir a un atacante remoto autenticado con privilegios administrativos ejecutar c\u00f3digo arbitrario sobre un dispositivo afectado. Las vulnerabilidades son debido a restricciones de l\u00edmite insuficientes en la entrada suministrada por el usuario para scripts en la interfaz de administraci\u00f3n basada en web. Un atacante con privilegios administrativos que sean suficientes para iniciar sesi\u00f3n en la interfaz de administraci\u00f3n basada en web podr\u00eda explotar cada vulnerabilidad mediante el env\u00edo de peticiones dise\u00f1adas que contienen valores demasiado grandes hacia un dispositivo afectado, causando un desbordamiento de la pila. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo se bloquee o permitir al atacante ejecutar c\u00f3digo arbitrario con privilegios root en el sistema operativo subyacente" } ], "id": "CVE-2020-3296", "lastModified": "2024-11-21T05:30:45.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "ykramarz@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-18T03:15:13.573", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | - | |
cisco | rv016 | - | |
cisco | rv042_firmware | - | |
cisco | rv042 | - | |
cisco | rv042g_firmware | - | |
cisco | rv042g | - | |
cisco | rv082_firmware | - | |
cisco | rv082 | - | |
cisco | rv320_firmware | - | |
cisco | rv320 | - | |
cisco | rv325_firmware | - | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCC05438-3064-4FB6-9177-9EA60C8E250C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5A39236-B032-46BB-94D0-3E0E3E557BC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E699C11F-3C7C-420D-9243-5CD2A6B98EF2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF65E38-D812-4F6E-903C-05E203F3E9F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C17C5F-4EB7-4859-8127-AE027A72CB2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69F1C458-0EF3-4AD6-9055-355711F3751E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20149", "lastModified": "2024-11-21T07:40:40.040", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:09.277", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 13:48
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA9B2E23-F7F6-44C8-8800-CB3FAECBCDF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "F445CE1E-CACF-4906-814D-3658EB5B8A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "987844EB-3E48-49DF-A95C-054D95F36F4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "54A716D3-2E68-4348-A42C-7ACB51107903", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F7458A81-C907-482C-889B-2DE32C1A9238", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "AAFC3C16-C6B4-4311-92C9-AB96BA91F8E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "CC353BA2-BCFC-44D1-A190-EFAC646E7D48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "C0466119-31BE-44AD-82A4-66C1315C128A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "62330002-CB84-434C-860A-A4C29B4C29C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "36A0F1E3-8FCA-4ED1-A6F1-FDC9D3F3E538", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "09CBB296-950D-42A1-B6F6-10EDF56AE763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F47C5A1E-5162-48E8-998C-5A452C86688E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C5E33427-60ED-4E42-A821-462A87BBEF53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B1A3E3E5-8B9F-4C15-A3B8-538202A60429", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "CFE2DAFE-F2A4-43A7-BAB5-053FE1D7BD30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "CD25C358-C310-41C1-AFA5-89E54D5012CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "A995298E-9655-4AAD-8ABC-71AC816E798D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "08DD66B1-F045-4500-B098-CA65F0914107", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "88DE2217-2A37-41D2-ADFE-6648969C676A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "BBC05564-DB6D-4EED-95D0-BF3553748E50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "59693DA5-9F18-4F4C-8C57-C7294CF12EA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "1FEA0358-5E6A-465F-829C-7A05B64E2EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3604DDDE-7C98-4014-B50F-8E8808245644", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "92E2E999-774D-406A-BE8F-0B5A01E1D907", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "5EC63ECD-D415-4D6C-A4E3-DCF6B8878474", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "D559E798-8CD9-463A-AF03-843BB589C599", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "C6D3ACE2-D67A-46B4-97E7-F8085BBBD086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7C346A18-C543-4E3B-A1A8-B7757D6D6E45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "40970E5B-AC59-4A61-BD7F-64468C882385", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "A6A12CFD-3DF8-4B40-B0D3-8FBE037D1BE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "42FA29EE-8000-486C-AEC3-01AE3DE88007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "2C32756E-FBCA-4485-8AFF-3A83570D7CDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "B066474A-AE23-48AB-A550-4F2FF3758CA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "D6306152-5BD8-4BD3-9E2D-D523DA54D497", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "3A665527-A2C9-4C10-B902-79C158DC589F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "1E99461F-4395-4A30-8B6D-2F63CA9851F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "61F75405-494A-446C-9C19-CC39E121D529", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "6BD8AED3-E2B1-46D6-8E04-C5C3E4186BB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "C03B0889-8AAA-455F-BBB5-B5BC417904B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "4FA3AF56-BF90-4F9E-9E29-1FF9D112AF3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "D46196B0-8E14-49F6-9E16-6E441D133357", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "8212115A-A2E7-4CF9-8093-0BD9162FF26F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "3D70F5D9-7F51-4782-B8B5-30A5AB569464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "36651493-4F0C-4CF6-935D-B128C9741A8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF65AFA9-26CD-4114-8246-07FAB904176B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "30972BB8-A616-4021-868F-A775092B3D41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "BBF50E2F-14D7-4738-B4DF-848A3F2814FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "F11630A4-0BBE-457E-B53F-11EA4448C92F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "D92E3198-22B2-491D-9815-2AA62AB0A30E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "EA876548-8B5A-4254-B154-58BCF03ADDA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3BCD33AD-A637-4C08-AE7E-9974B86CDDE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "935EA2B1-EC2A-4B17-A563-9515579D6161", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "B38C7123-D65B-4840-AC28-A530CD4ECCA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "C0E595E2-B201-4689-B05D-1C3E44876D74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "F73AC635-05BF-4476-9548-D72D32A313FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "7A734929-DF60-4B5B-8380-1BBD093C1E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "E1D6863E-2DFB-4BDD-BC3A-B94F84F51E30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "816E98BD-38C5-41CC-8736-5BFFBBA447E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "86779EB2-CF50-4CEF-8815-56C8BB517698", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FAD122DD-2FB2-4E55-A77C-7235B5501C6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "E0955403-0054-476F-A162-77CCD5C475AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "5A9C297F-5B9E-4591-94C8-5EBEFB2D8CEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7EAB2D55-EE1B-499F-B0C0-78538660985E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3001E0B0-01FD-4DFC-B195-7CE2E156F990", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0B0EDE6F-47B3-48A2-A0C3-2AEC8FFA666E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "DE455ACF-E775-4ADE-95E9-F2162FE79486", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "94D78C7E-5E5A-457F-9D79-58E123145F41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "0DCC0019-F4EF-4CB7-AED1-CC84A413DB1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "4BD3AE38-E227-4B55-B492-18614D258905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "AB9D70F1-9499-480A-A53E-8FC2BA17DCDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "DC7A6DF2-C4FC-4BAA-8ABB-0B60BA0357BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "575EC78E-71EE-4657-8413-7D60F2E933C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "834D2F6A-2590-4073-A6F5-AC88A32C30DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "EC89C839-57E0-4FDD-9597-01F8795B4DB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "A119367F-2F09-4750-A8B9-F176A10A55CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "C2062E92-F6BD-4AE7-86AA-682C36E33A9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "25EC7568-713E-44DD-9418-23013749CC21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "63D3656F-9D46-4F6C-B8E1-B04243BFD57B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "86DE5F2E-9B5E-4430-8B3D-97843462FE49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "0DA83932-5061-4F7B-B152-E013D679C7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "AFA29437-B6C7-4C74-90F6-5CF58F54756B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "261D3EEA-6227-4136-91DD-380A2BF3635A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "64765C29-84C1-4F41-9BB4-18A0C43B197C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "44B039E2-0220-481F-B550-3358402FB390", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "BA050DDE-682E-4A54-995A-E3EDB19E45EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B48800BA-A64E-4C18-A6A5-651FFF3A18ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "EC4983FF-DA90-4F10-A511-D0C2531D8380", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "AE80F7A6-0A91-488C-BEE8-F23057AA1ECD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "08029110-3FE5-4DEB-AE76-2B165C4E79C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "B9779344-6BAB-4D21-8DB2-4BA9D7E55F2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "490D19A8-3494-4133-8CA6-0733CDB4CC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "CBB99BF6-11C0-448C-91B2-F03690CE9089", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "61348305-FC9B-4DB4-B039-0A08D44812EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C8CE8BC-05D9-45D3-A645-D1A081E1A555", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "6DC1BA1F-1210-4FBE-B218-B9FDC4711AE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "5539C19B-97D1-44C3-8883-0343B574133D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "99A1A830-0F70-47D7-89D5-7B50F69C6312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "43F1FCD5-4BC8-4051-982E-7112F5A128C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "B71B1E3F-F7DE-4B0A-8304-0980B6EDB776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "79F12DFE-4241-4D0B-A0BC-F022B6995921", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "383C020A-F8FD-48F9-8F82-1CDE8620D6E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6213B8E5-3E2E-43F0-A0ED-72EC414C39B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0CEE2D4D-5627-4DD5-B8A5-88B0A8440CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CE3F4194-12F3-4379-AC7E-7BB6BFD4A76B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A4DFF375-C9E5-40A9-9167-9DADE291763B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "3A36C9D3-4CD6-4708-A721-4CA905306617", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "7A0C39EC-75DC-4ECF-8012-C3062375836A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5A03BB26-A344-498B-8FE4-3D027EFC6606", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "E4DF1BAD-EFCF-4723-AAB5-B2733992659C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "CC474FF5-E3BE-4B81-B5AC-1D32A44C259F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "A5910845-D601-4503-82CC-49D8A11F4B31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "9F5FECB4-41D4-4FDF-8693-7FF1D51CF1D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "1DE7FBF1-11F4-4B36-BFD2-041A14E70360", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "4750C422-7D8B-45CC-BD33-35D9BE5FFBC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "40902BFF-81A9-4CFC-9FC1-61F353DEFDF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EA80139-B632-4108-BB44-41A4ABA41F83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv320_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "0C17CE07-41E0-4115-AC82-5C697DA8C5C8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E07888E-FEC4-43F2-90D1-91665606BD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.0.2.03:*:*:*:*:*:*:*", "matchCriteriaId": "B338AFCE-9219-4F70-A08A-A9E6E0E967EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.0.09:*:*:*:*:*:*:*", "matchCriteriaId": "A00ADE78-233F-4284-AC67-4606306D7EC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.06:*:*:*:*:*:*:*", "matchCriteriaId": "664F445F-91A3-4AE9-8D60-76C656402EB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "01C90ED8-03B2-4FF8-9C8E-8340A5E8E13B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "557AB540-0F7F-4F54-9BCD-9103217C923E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "AA7F2FC6-F13E-445D-B2B6-01A7019F90F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7AAE28E-65DE-425A-917E-549DC1D0DFA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "91CA984F-F579-421C-9A11-DCBE731A49FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.2.02:*:*:*:*:*:*:*", "matchCriteriaId": "33E8C022-40EE-4B36-B7ED-3E51CBB1AB9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.6-tm:*:*:*:*:*:*:*", "matchCriteriaId": "26CD8F90-6BA8-466F-92D9-FFC264574F77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.12.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "FC42A543-F2BB-4FFF-9674-61D01F3406DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.3.13.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "BBEE1D3B-1D22-4024-9191-56B2615F8ADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "A402AB90-03C8-4B5B-AEF9-CDAC023DA6D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "F865F54F-E4D6-4B92-9644-992A44F7D562", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "91AC5D05-728E-49A8-8A75-2CF97FAFD68D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "D82F96CC-94E9-46C5-B886-CD63B2060145", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.4.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "EC425B75-5584-4184-BEC0-44FAD8B431DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.05:*:*:*:*:*:*:*", "matchCriteriaId": "B9B992F2-43D5-4FBF-A94A-EA8E8B0EBB01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "A660B64F-2CF8-48C3-877E-B583E1CFC0FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55476CAD-BDB3-46CB-95A0-74BA8F49A5D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.1-tm:*:*:*:*:*:*:*", "matchCriteriaId": "A89E5621-BA1F-450C-8E82-FC4764B54905", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.0.19-tm:*:*:*:*:*:*:*", "matchCriteriaId": "6B4DF0F5-853A-430E-8C93-556D4FF29C63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:3.0.2.01-tm:*:*:*:*:*:*:*", "matchCriteriaId": "109BC8D1-E547-45C4-99AA-C74495F8E8CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "67F823CE-90D6-4914-B125-88B6F868808D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.2.08-tm:*:*:*:*:*:*:*", "matchCriteriaId": "53551C1A-9DBD-4E5E-8FA7-C04EE2A38D20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.3.03-tm:*:*:*:*:*:*:*", "matchCriteriaId": "CC2360AC-5C88-4F8B-9BC8-48FBA716CFBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.0.4.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "F4C3D1D3-034B-4B6E-BC78-050D22A3D84E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.0.02-tm:*:*:*:*:*:*:*", "matchCriteriaId": "15271254-5905-4D08-BD9E-08F841AA29D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.1.1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5AB609CB-934B-43E4-A884-FDC7B58D0560", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.1.02:*:*:*:*:*:*:*", "matchCriteriaId": "70B52828-6B38-4561-9D79-83DD8EC294A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.2.08:*:*:*:*:*:*:*", "matchCriteriaId": "9DDE7B4C-CF8F-4CE6-AD3F-CE74377D4077", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "523B6515-33AE-4606-A7D6-C698D26659D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "42A388D2-AE67-4B5E-AFEF-32F7834652E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.07:*:*:*:*:*:*:*", "matchCriteriaId": "B30845DA-3C00-4567-B590-61BAC547B312", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "D28A6411-627C-46BE-9D59-3519B3816BD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "00659549-4B19-4B16-8DBD-71627453A1EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "3724D315-5DCD-4378-85F1-1880C535317C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:rv325_firmware:4.2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "45F4AF99-6774-4EF4-BD0C-64FE18FC3B46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores Cisco Small Business RV042, RV042G, RV320 y RV325 podr\u00eda permitir que un atacante remoto autenticado, de nivel de administrador, provoque una recarga inesperada de un dispositivo afectado, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Para explotar esta vulnerabilidad, un atacante necesitar\u00eda tener credenciales de administrador v\u00e1lidas en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada del usuario que se encuentra en los paquetes HTTP entrantes. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud HTTP manipulada a la interfaz de administraci\u00f3n basada en web del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante provoque una recarga inesperada del dispositivo, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2024-20523", "lastModified": "2024-10-08T13:48:29.500", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:19.707", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-05 19:15
Modified
2024-11-21 07:40
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | rv016_firmware | * | |
cisco | rv016 | - | |
cisco | rv042_firmware | * | |
cisco | rv042 | - | |
cisco | rv042g_firmware | * | |
cisco | rv042g | - | |
cisco | rv082_firmware | * | |
cisco | rv082 | - | |
cisco | rv320_firmware | * | |
cisco | rv320 | - | |
cisco | rv325_firmware | * | |
cisco | rv325 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E1462E9-4464-492C-8B91-6E020B9DCB23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "matchCriteriaId": "701E3CF5-15C0-419A-97A8-9BD2C55D74AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E01122-CD88-4096-958A-8699B2A3DC3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DCBB2D8-AACF-45EA-B9D4-DAECC7C792D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A620D1C-1FBB-46C9-9904-1FC6342ED85E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1CD7D9C-DDEF-4DF0-BCFB-A45301AE2C10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDB4B5-9528-43CE-B8E6-B509EFCD11BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FC4446-22C0-4EC9-84B4-A76412680105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EA568A8-286F-4588-B946-6F9C97E08BCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596F6D4-10DA-4F29-95AD-75B60F4670D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3B7DECE-18C4-45AE-AF5C-657A4795C7F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "matchCriteriaId": "3435D601-EDA8-49FF-8841-EA6DF1518C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "id": "CVE-2023-20143", "lastModified": "2024-11-21T07:40:39.253", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "ykramarz@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-05T19:15:08.973", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "ykramarz@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2024-20521
Vulnerability from cvelistv5
Published
2024-10-02 16:56
Modified
2024-10-17 19:51
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: 4.0.2.08-tm Version: 4.2.3.08 Version: 4.1.1.01 Version: 4.2.3.03 Version: 3.0.0.1-tm Version: 4.1.0.02-tm Version: 4.2.3.09 Version: 3.0.2.01-tm Version: 4.2.3.10 Version: 3.0.0.19-tm Version: 4.2.3.06 Version: 4.2.2.08 Version: 4.0.3.03-tm Version: 4.0.0.7 Version: 4.2.1.02 Version: 4.2.3.07 Version: 4.0.4.02-tm Version: 1.3.12.19-tm Version: 1.3.12.6-tm Version: 1.3.13.02-tm Version: 1.3.1.10 Version: 1.2.1.13 Version: 1.1.1.19 Version: 1.4.2.15 Version: 1.5.1.05 Version: 1.0.2.03 Version: 1.1.0.09 Version: 1.2.1.14 Version: 1.3.2.02 Version: 1.3.1.12 Version: 1.0.1.17 Version: 1.4.2.19 Version: 1.1.1.06 Version: 1.4.2.20 Version: 1.4.2.22 Version: 1.4.2.17 Version: 4.2.3.14 Version: 1.5.1.11 Version: 1.5.1.13 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20521", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T18:25:56.653631Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T19:51:56.350Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:56:42.263Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "source": { "advisory": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "defects": [ "CSCwm48770" ], "discovery": "EXTERNAL" }, "title": "Cisco Small Business RV042, RV042G, RV320, and RV325 Remote Command Execution Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20521", "datePublished": "2024-10-02T16:56:42.263Z", "dateReserved": "2023-11-08T15:08:07.690Z", "dateUpdated": "2024-10-17T19:51:56.350Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3279
Vulnerability from cvelistv5
Published
2020-06-18 02:15
Modified
2024-11-15 17:09
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3279", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:24:04.093578Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:09:24.646Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:15:32", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "source": { "advisory": "cisco-sa-rv-routers-Rj5JRfF8", "defect": [ [ "CSCvt26490", "CSCvt26504", "CSCvt26669", "CSCvt26676", "CSCvt26683", "CSCvt26714", "CSCvt29372", "CSCvt29376", "CSCvt29405", "CSCvt29407", "CSCvt29409", "CSCvt29415" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3279", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Command Injection Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ] }, "source": { "advisory": "cisco-sa-rv-routers-Rj5JRfF8", "defect": [ [ "CSCvt26490", "CSCvt26504", "CSCvt26669", "CSCvt26676", "CSCvt26683", "CSCvt26714", "CSCvt29372", "CSCvt29376", "CSCvt29405", "CSCvt29407", "CSCvt29409", "CSCvt29415" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3279", "datePublished": "2020-06-18T02:15:32.305196Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:09:24.646Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20117
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-28 16:30
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as the root user on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates to address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv32x-cmdinject-cKQsZpxL" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20117", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T16:19:12.821445Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T16:30:47.940Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as the root user on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates to address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-146", "description": "CWE-146", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv32x-cmdinject-cKQsZpxL" } ], "source": { "advisory": "cisco-sa-sb-rv32x-cmdinject-cKQsZpxL", "defect": [ [ "CSCwe57193", "CSCwe63677" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers Command Injection Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20117", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-28T16:30:47.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20139
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 15:59
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20139", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:35:08.686490Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:59:56.640Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20139", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:59:56.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1828
Vulnerability from cvelistv5
Published
2019-04-04 15:30
Modified
2024-11-21 19:40
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-weak-encrypt | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107774 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: unspecified < 1.4.2.22 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:42.852Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190404 Cisco Small Business RV320 and RV325 Routers Weak Credential Encryption Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-weak-encrypt" }, { "name": "107774", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107774" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1828", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:59:40.214880Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:40:37.195Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "lessThan": "1.4.2.22", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware of the public announcement or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "CWE-327", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-05T10:06:05", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190404 Cisco Small Business RV320 and RV325 Routers Weak Credential Encryption Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-weak-encrypt" }, { "name": "107774", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107774" } ], "source": { "advisory": "cisco-sa-20190404-rv-weak-encrypt", "defect": [ [ "CSCvp09573" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV320 and RV325 Routers Weak Credential Encryption Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-04-04T14:00:00-0700", "ID": "CVE-2019-1828", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV320 and RV325 Routers Weak Credential Encryption Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "1.4.2.22" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware of the public announcement or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.9", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-327" } ] } ] }, "references": { "reference_data": [ { "name": "20190404 Cisco Small Business RV320 and RV325 Routers Weak Credential Encryption Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-weak-encrypt" }, { "name": "107774", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107774" } ] }, "source": { "advisory": "cisco-sa-20190404-rv-weak-encrypt", "defect": [ [ "CSCvp09573" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1828", "datePublished": "2019-04-04T15:30:19.808325Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:40:37.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20522
Vulnerability from cvelistv5
Published
2024-10-02 16:57
Modified
2024-10-02 18:52
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: 4.0.2.08-tm Version: 4.2.3.08 Version: 4.1.1.01 Version: 4.2.3.03 Version: 3.0.0.1-tm Version: 4.1.0.02-tm Version: 4.2.3.09 Version: 3.0.2.01-tm Version: 4.2.3.10 Version: 3.0.0.19-tm Version: 4.2.3.06 Version: 4.2.2.08 Version: 4.0.3.03-tm Version: 4.0.0.7 Version: 4.2.1.02 Version: 4.2.3.07 Version: 4.0.4.02-tm Version: 1.3.12.19-tm Version: 1.3.12.6-tm Version: 1.3.13.02-tm Version: 1.3.1.10 Version: 1.2.1.13 Version: 1.1.1.19 Version: 1.4.2.15 Version: 1.5.1.05 Version: 1.0.2.03 Version: 1.1.0.09 Version: 1.2.1.14 Version: 1.3.2.02 Version: 1.3.1.12 Version: 1.0.1.17 Version: 1.4.2.19 Version: 1.1.1.06 Version: 1.4.2.20 Version: 1.4.2.22 Version: 1.4.2.17 Version: 4.2.3.14 Version: 1.5.1.11 Version: 1.5.1.13 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "small_business_rv_series_router_firmware", "vendor": "cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20522", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T18:28:32.467559Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T18:52:46.250Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:57:27.083Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "source": { "advisory": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "defects": [ "CSCwm48770" ], "discovery": "EXTERNAL" }, "title": "Cisco Small Business RV042, RV042G, RV320, and RV325 Denial of Service Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20522", "datePublished": "2024-10-02T16:57:27.083Z", "dateReserved": "2023-11-08T15:08:07.690Z", "dateUpdated": "2024-10-02T18:52:46.250Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20148
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 15:58
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:34.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20148", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:34:46.418433Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:58:53.157Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20148", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:58:53.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20141
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 15:59
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20141", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:35:05.871408Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:59:41.207Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20141", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:59:41.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3277
Vulnerability from cvelistv5
Published
2020-06-18 02:15
Modified
2024-11-15 17:09
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3277", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:24:06.541916Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:09:48.721Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:15:18", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "source": { "advisory": "cisco-sa-rv-routers-Rj5JRfF8", "defect": [ [ "CSCvt26490", "CSCvt26504", "CSCvt26669", "CSCvt26676", "CSCvt26683", "CSCvt26714", "CSCvt29372", "CSCvt29376", "CSCvt29405", "CSCvt29407", "CSCvt29409", "CSCvt29415" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3277", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Command Injection Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ] }, "source": { "advisory": "cisco-sa-rv-routers-Rj5JRfF8", "defect": [ [ "CSCvt26490", "CSCvt26504", "CSCvt26669", "CSCvt26676", "CSCvt26683", "CSCvt26714", "CSCvt29372", "CSCvt29376", "CSCvt29405", "CSCvt29407", "CSCvt29409", "CSCvt29415" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3277", "datePublished": "2020-06-18T02:15:18.274324Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:09:48.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20124
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-28 16:30
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device. Cisco has not released software updates that address this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:36.160Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Remote Command Execution Vulnerability", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv01x_rv32x_rce-nzAGWWDD" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20124", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T16:19:07.895615Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T16:30:19.467Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device. Cisco has not released software updates that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Remote Command Execution Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv01x_rv32x_rce-nzAGWWDD" } ], "source": { "advisory": "cisco-sa-sb-rv01x_rv32x_rce-nzAGWWDD", "defect": [ [ "CSCwe67655", "CSCwe67659" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Remote Command Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20124", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-28T16:30:19.467Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15957
Vulnerability from cvelistv5
Published
2020-09-23 00:27
Modified
2024-11-13 18:02
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system. When processed, the commands will be executed with root privileges. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by providing malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as the root user.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbr-cominj | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:03:32.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20191106 Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbr-cominj" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-15957", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T17:17:58.815376Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T18:02:49.546Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-11-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system. When processed, the commands will be executed with root privileges. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by providing malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as the root user." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-23T00:27:26", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20191106 Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbr-cominj" } ], "source": { "advisory": "cisco-sa-20191106-sbr-cominj", "defect": [ [ "CSCvq76768", "CSCvr39939" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Command Injection Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-11-06T16:00:00", "ID": "CVE-2019-15957", "STATE": "PUBLIC", "TITLE": "Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Command Injection Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system. When processed, the commands will be executed with root privileges. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by providing malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as the root user." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20191106 Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Command Injection Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbr-cominj" } ] }, "source": { "advisory": "cisco-sa-20191106-sbr-cominj", "defect": [ [ "CSCvq76768", "CSCvr39939" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-15957", "datePublished": "2020-09-23T00:27:26.557778Z", "dateReserved": "2019-09-06T00:00:00", "dateUpdated": "2024-11-13T18:02:49.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3274
Vulnerability from cvelistv5
Published
2020-06-18 02:21
Modified
2024-11-15 16:58
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3274", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:33.272593Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:58:26.378Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:21:45", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "source": { "advisory": "cisco-sa-rv-routers-Rj5JRfF8", "defect": [ [ "CSCvt26490", "CSCvt26504", "CSCvt26669", "CSCvt26676", "CSCvt26683", "CSCvt26714", "CSCvt29372", "CSCvt29376", "CSCvt29405", "CSCvt29407", "CSCvt29409", "CSCvt29415" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3274", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Command Injection Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ] }, "source": { "advisory": "cisco-sa-rv-routers-Rj5JRfF8", "defect": [ [ "CSCvt26490", "CSCvt26504", "CSCvt26669", "CSCvt26676", "CSCvt26683", "CSCvt26714", "CSCvt29372", "CSCvt29376", "CSCvt29405", "CSCvt29407", "CSCvt29409", "CSCvt29415" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3274", "datePublished": "2020-06-18T02:21:45.469314Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T16:58:26.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20144
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 15:59
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20144", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:35:00.710262Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:59:17.421Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20144", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:59:17.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3275
Vulnerability from cvelistv5
Published
2020-06-18 02:21
Modified
2024-11-15 16:58
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3275", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:31.940556Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:58:15.132Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:21:49", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "source": { "advisory": "cisco-sa-rv-routers-Rj5JRfF8", "defect": [ [ "CSCvt26490", "CSCvt26504", "CSCvt26669", "CSCvt26676", "CSCvt26683", "CSCvt26714", "CSCvt29372", "CSCvt29376", "CSCvt29405", "CSCvt29407", "CSCvt29409", "CSCvt29415" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3275", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Command Injection Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ] }, "source": { "advisory": "cisco-sa-rv-routers-Rj5JRfF8", "defect": [ [ "CSCvt26490", "CSCvt26504", "CSCvt26669", "CSCvt26676", "CSCvt26683", "CSCvt26714", "CSCvt29372", "CSCvt29376", "CSCvt29405", "CSCvt29407", "CSCvt29409", "CSCvt29415" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3275", "datePublished": "2020-06-18T02:21:50.062911Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T16:58:15.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3286
Vulnerability from cvelistv5
Published
2020-06-18 02:15
Modified
2024-11-15 17:09
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3286", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:24:02.908900Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:09:13.891Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:15:36", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3286", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ] }, "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3286", "datePublished": "2020-06-18T02:15:36.829409Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:09:13.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3294
Vulnerability from cvelistv5
Published
2020-06-18 02:16
Modified
2024-11-15 17:07
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3294", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:46.663893Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:07:36.043Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:16:13", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3294", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ] }, "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3294", "datePublished": "2020-06-18T02:16:13.564380Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:07:36.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3293
Vulnerability from cvelistv5
Published
2020-06-18 02:16
Modified
2024-11-15 17:07
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.514Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3293", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:47.818871Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:07:52.769Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:16:09", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3293", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ] }, "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3293", "datePublished": "2020-06-18T02:16:09.177103Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:07:52.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20149
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 15:58
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:34.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20149", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:34:44.905161Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:58:46.117Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20149", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:58:46.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20145
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 15:59
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20145", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:34:54.362234Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:59:09.552Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20145", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:59:09.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20146
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-11-06 14:17
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:34.964Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20146", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T16:17:58.315861Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T14:17:20.500Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20146", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-11-06T14:17:20.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1652
Vulnerability from cvelistv5
Published
2019-01-24 16:00
Modified
2024-11-12 21:21
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject | vendor-advisory, x_refsource_CISCO | |
https://www.exploit-db.com/exploits/46243/ | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/bid/106728 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2019/Mar/61 | mailing-list, x_refsource_FULLDISC | |
https://seclists.org/bugtraq/2019/Mar/55 | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html | x_refsource_MISC | |
http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html | x_refsource_MISC | |
https://www.exploit-db.com/exploits/46655/ | exploit, x_refsource_EXPLOIT-DB |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.337Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190123 Cisco Small Business RV320 and RV325 Routers Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject" }, { "name": "46243", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/46243/" }, { "name": "106728", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106728" }, { "name": "20190327 [RT-SA-2019-005] Cisco RV320 Command Injection Retrieval", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/61" }, { "name": "20190327 [RT-SA-2019-005] Cisco RV320 Command Injection Retrieval", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Mar/55" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html" }, { "name": "46655", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/46655/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1652", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:20:43.659526Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-1652" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T21:21:31.004Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-03T19:06:07", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190123 Cisco Small Business RV320 and RV325 Routers Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject" }, { "name": "46243", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/46243/" }, { "name": "106728", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106728" }, { "name": "20190327 [RT-SA-2019-005] Cisco RV320 Command Injection Retrieval", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/61" }, { "name": "20190327 [RT-SA-2019-005] Cisco RV320 Command Injection Retrieval", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Mar/55" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html" }, { "name": "46655", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/46655/" } ], "source": { "advisory": "cisco-sa-20190123-rv-inject", "defect": [ [ "CSCvm78058" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV320 and RV325 Routers Command Injection Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-01-23T16:00:00-0800", "ID": "CVE-2019-1652", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV320 and RV325 Routers Command Injection Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20190123 Cisco Small Business RV320 and RV325 Routers Command Injection Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject" }, { "name": "46243", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/46243/" }, { "name": "106728", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106728" }, { "name": "20190327 [RT-SA-2019-005] Cisco RV320 Command Injection Retrieval", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Mar/61" }, { "name": "20190327 [RT-SA-2019-005] Cisco RV320 Command Injection Retrieval", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Mar/55" }, { "name": "http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html" }, { "name": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html" }, { "name": "46655", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/46655/" } ] }, "source": { "advisory": "cisco-sa-20190123-rv-inject", "defect": [ [ "CSCvm78058" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1652", "datePublished": "2019-01-24T16:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-12T21:21:31.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3278
Vulnerability from cvelistv5
Published
2020-06-18 02:15
Modified
2024-11-15 17:09
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3278", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:24:05.376930Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:09:35.272Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:15:27", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "source": { "advisory": "cisco-sa-rv-routers-Rj5JRfF8", "defect": [ [ "CSCvt26490", "CSCvt26504", "CSCvt26669", "CSCvt26676", "CSCvt26683", "CSCvt26714", "CSCvt29372", "CSCvt29376", "CSCvt29405", "CSCvt29407", "CSCvt29409", "CSCvt29415" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3278", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Command Injection Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ] }, "source": { "advisory": "cisco-sa-rv-routers-Rj5JRfF8", "defect": [ [ "CSCvt26490", "CSCvt26504", "CSCvt26669", "CSCvt26676", "CSCvt26683", "CSCvt26714", "CSCvt29372", "CSCvt29376", "CSCvt29405", "CSCvt29407", "CSCvt29409", "CSCvt29415" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3278", "datePublished": "2020-06-18T02:15:27.684050Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:09:35.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1653
Vulnerability from cvelistv5
Published
2019-01-24 16:00
Modified
2024-11-12 21:21
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=bx0RQJDlGbY" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://badpackets.net/over-9000-cisco-rv320-rv325-routers-vulnerable-to-cve-2019-1653/" }, { "name": "20190123 Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-info" }, { "name": "106732", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106732" }, { "name": "46262", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/46262/" }, { "name": "20190327 [RT-SA-2019-004] Cisco RV320 Unauthenticated Diagnostic Data Retrieval", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/60" }, { "name": "20190327 [RT-SA-2019-003] Cisco RV320 Unauthenticated Configuration Export", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/59" }, { "name": "20190327 [RT-SA-2019-004] Cisco RV320 Unauthenticated Diagnostic Data Retrieval", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Mar/54" }, { "name": "20190327 [RT-SA-2019-003] Cisco RV320 Unauthenticated Configuration Export", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Mar/53" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152260/Cisco-RV320-Unauthenticated-Configuration-Export.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152261/Cisco-RV320-Unauthenticated-Diagnostic-Data-Retrieval.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html" }, { "name": "46655", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/46655/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zdnet.com/article/hackers-are-going-after-cisco-rv320rv325-routers-using-a-new-exploit/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://threatpost.com/scans-cisco-routers-code-execution/141218/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1653", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:20:12.536408Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-1653" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T21:21:15.193Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-08T19:15:16", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=bx0RQJDlGbY" }, { "tags": [ "x_refsource_MISC" ], "url": "https://badpackets.net/over-9000-cisco-rv320-rv325-routers-vulnerable-to-cve-2019-1653/" }, { "name": "20190123 Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-info" }, { "name": "106732", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106732" }, { "name": "46262", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/46262/" }, { "name": "20190327 [RT-SA-2019-004] Cisco RV320 Unauthenticated Diagnostic Data Retrieval", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/60" }, { "name": "20190327 [RT-SA-2019-003] Cisco RV320 Unauthenticated Configuration Export", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Mar/59" }, { "name": "20190327 [RT-SA-2019-004] Cisco RV320 Unauthenticated Diagnostic Data Retrieval", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Mar/54" }, { "name": "20190327 [RT-SA-2019-003] Cisco RV320 Unauthenticated Configuration Export", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Mar/53" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152260/Cisco-RV320-Unauthenticated-Configuration-Export.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152261/Cisco-RV320-Unauthenticated-Diagnostic-Data-Retrieval.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html" }, { "name": "46655", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/46655/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zdnet.com/article/hackers-are-going-after-cisco-rv320rv325-routers-using-a-new-exploit/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://threatpost.com/scans-cisco-routers-code-execution/141218/" } ], "source": { "advisory": "cisco-sa-20190123-rv-info", "defect": [ [ "CSCvg85922" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-01-23T16:00:00-0800", "ID": "CVE-2019-1653", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information. The vulnerability is due to improper access controls for URLs. An attacker could exploit this vulnerability by connecting to an affected device via HTTP or HTTPS and requesting specific URLs. A successful exploit could allow the attacker to download the router configuration or detailed diagnostic information. Cisco has released firmware updates that address this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.5", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.youtube.com/watch?v=bx0RQJDlGbY", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=bx0RQJDlGbY" }, { "name": "https://badpackets.net/over-9000-cisco-rv320-rv325-routers-vulnerable-to-cve-2019-1653/", "refsource": "MISC", "url": "https://badpackets.net/over-9000-cisco-rv320-rv325-routers-vulnerable-to-cve-2019-1653/" }, { "name": "20190123 Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-info" }, { "name": "106732", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106732" }, { "name": "46262", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/46262/" }, { "name": "20190327 [RT-SA-2019-004] Cisco RV320 Unauthenticated Diagnostic Data Retrieval", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Mar/60" }, { "name": "20190327 [RT-SA-2019-003] Cisco RV320 Unauthenticated Configuration Export", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Mar/59" }, { "name": "20190327 [RT-SA-2019-004] Cisco RV320 Unauthenticated Diagnostic Data Retrieval", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Mar/54" }, { "name": "20190327 [RT-SA-2019-003] Cisco RV320 Unauthenticated Configuration Export", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Mar/53" }, { "name": "http://packetstormsecurity.com/files/152260/Cisco-RV320-Unauthenticated-Configuration-Export.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152260/Cisco-RV320-Unauthenticated-Configuration-Export.html" }, { "name": "http://packetstormsecurity.com/files/152261/Cisco-RV320-Unauthenticated-Diagnostic-Data-Retrieval.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152261/Cisco-RV320-Unauthenticated-Diagnostic-Data-Retrieval.html" }, { "name": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html" }, { "name": "46655", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/46655/" }, { "name": "https://www.zdnet.com/article/hackers-are-going-after-cisco-rv320rv325-routers-using-a-new-exploit/", "refsource": "MISC", "url": "https://www.zdnet.com/article/hackers-are-going-after-cisco-rv320rv325-routers-using-a-new-exploit/" }, { "name": "https://threatpost.com/scans-cisco-routers-code-execution/141218/", "refsource": "MISC", "url": "https://threatpost.com/scans-cisco-routers-code-execution/141218/" } ] }, "source": { "advisory": "cisco-sa-20190123-rv-info", "defect": [ [ "CSCvg85922" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1653", "datePublished": "2019-01-24T16:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-12T21:21:15.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20520
Vulnerability from cvelistv5
Published
2024-10-02 16:56
Modified
2024-10-02 19:09
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: 4.0.2.08-tm Version: 4.2.3.08 Version: 4.1.1.01 Version: 4.2.3.03 Version: 3.0.0.1-tm Version: 4.1.0.02-tm Version: 4.2.3.09 Version: 3.0.2.01-tm Version: 4.2.3.10 Version: 3.0.0.19-tm Version: 4.2.3.06 Version: 4.2.2.08 Version: 4.0.3.03-tm Version: 4.0.0.7 Version: 4.2.1.02 Version: 4.2.3.07 Version: 4.0.4.02-tm Version: 1.3.12.19-tm Version: 1.3.12.6-tm Version: 1.3.13.02-tm Version: 1.3.1.10 Version: 1.2.1.13 Version: 1.1.1.19 Version: 1.4.2.15 Version: 1.5.1.05 Version: 1.0.2.03 Version: 1.1.0.09 Version: 1.2.1.14 Version: 1.3.2.02 Version: 1.3.1.12 Version: 1.0.1.17 Version: 1.4.2.19 Version: 1.1.1.06 Version: 1.4.2.20 Version: 1.4.2.22 Version: 1.4.2.17 Version: 4.2.3.14 Version: 1.5.1.11 Version: 1.5.1.13 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "small_business_rv_series_router_firmware", "vendor": "cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20520", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T18:55:31.611704Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T19:09:54.092Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:56:33.815Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "source": { "advisory": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "defects": [ "CSCwm48770" ], "discovery": "EXTERNAL" }, "title": "Cisco Small Business RV042, RV042G, RV320, and RV325 Remote Command Execution Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20520", "datePublished": "2024-10-02T16:56:33.815Z", "dateReserved": "2023-11-08T15:08:07.690Z", "dateUpdated": "2024-10-02T19:09:54.092Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3291
Vulnerability from cvelistv5
Published
2020-06-18 02:15
Modified
2024-11-15 17:08
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3291", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:50.963400Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:08:19.214Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:15:59", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3291", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ] }, "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3291", "datePublished": "2020-06-18T02:15:59.362777Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:08:19.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20128
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-28 16:32
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as the root user on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates to address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.577Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv32x-cmdinject-cKQsZpxL" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20128", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T16:19:06.723059Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T16:32:20.104Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as the root user on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates to address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-146", "description": "CWE-146", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv32x-cmdinject-cKQsZpxL" } ], "source": { "advisory": "cisco-sa-sb-rv32x-cmdinject-cKQsZpxL", "defect": [ [ "CSCwe57193", "CSCwe63677" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers Command Injection Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20128", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-28T16:32:20.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20143
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 15:59
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.889Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20143", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:35:02.534309Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:59:25.961Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20143", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:59:25.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20140
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 15:59
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:36.128Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20140", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:35:07.446266Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:59:49.069Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20140", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:59:49.069Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3290
Vulnerability from cvelistv5
Published
2020-06-18 02:15
Modified
2024-11-15 17:08
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:58.000Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3290", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:52.205745Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:08:30.650Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:15:54", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3290", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ] }, "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3290", "datePublished": "2020-06-18T02:15:54.897489Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:08:30.650Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3276
Vulnerability from cvelistv5
Published
2020-06-18 02:21
Modified
2024-11-15 16:58
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3276", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:30.505285Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:58:03.040Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:21:54", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ], "source": { "advisory": "cisco-sa-rv-routers-Rj5JRfF8", "defect": [ [ "CSCvt26490", "CSCvt26504", "CSCvt26669", "CSCvt26676", "CSCvt26683", "CSCvt26714", "CSCvt29372", "CSCvt29376", "CSCvt29405", "CSCvt29407", "CSCvt29409", "CSCvt29415" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3276", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Command Injection Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Command Injection Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8" } ] }, "source": { "advisory": "cisco-sa-rv-routers-Rj5JRfF8", "defect": [ [ "CSCvt26490", "CSCvt26504", "CSCvt26669", "CSCvt26676", "CSCvt26683", "CSCvt26714", "CSCvt29372", "CSCvt29376", "CSCvt29405", "CSCvt29407", "CSCvt29409", "CSCvt29415" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3276", "datePublished": "2020-06-18T02:21:54.238317Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T16:58:03.040Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20519
Vulnerability from cvelistv5
Published
2024-10-02 16:56
Modified
2024-10-02 19:12
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: 4.0.2.08-tm Version: 4.2.3.08 Version: 4.1.1.01 Version: 4.2.3.03 Version: 3.0.0.1-tm Version: 4.1.0.02-tm Version: 4.2.3.09 Version: 3.0.2.01-tm Version: 4.2.3.10 Version: 3.0.0.19-tm Version: 4.2.3.06 Version: 4.2.2.08 Version: 4.0.3.03-tm Version: 4.0.0.7 Version: 4.2.1.02 Version: 4.2.3.07 Version: 4.0.4.02-tm Version: 1.3.12.19-tm Version: 1.3.12.6-tm Version: 1.3.13.02-tm Version: 1.3.1.10 Version: 1.2.1.13 Version: 1.1.1.19 Version: 1.4.2.15 Version: 1.5.1.05 Version: 1.0.2.03 Version: 1.1.0.09 Version: 1.2.1.14 Version: 1.3.2.02 Version: 1.3.1.12 Version: 1.0.1.17 Version: 1.4.2.19 Version: 1.1.1.06 Version: 1.4.2.20 Version: 1.4.2.22 Version: 1.4.2.17 Version: 4.2.3.14 Version: 1.5.1.11 Version: 1.5.1.13 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "small_business_rv_series_router_firmware", "vendor": "cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20519", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T18:55:47.348958Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T19:12:10.672Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:56:21.994Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "source": { "advisory": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "defects": [ "CSCwm48770" ], "discovery": "EXTERNAL" }, "title": "Cisco Small Business RV042, RV042G, RV320, and RV325 Remote Command Execution Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20519", "datePublished": "2024-10-02T16:56:21.994Z", "dateReserved": "2023-11-08T15:08:07.690Z", "dateUpdated": "2024-10-02T19:12:10.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20138
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 16:00
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20138", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:35:10.509886Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T16:00:12.109Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20138", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T16:00:12.109Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3289
Vulnerability from cvelistv5
Published
2020-06-18 02:15
Modified
2024-11-15 17:08
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.857Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3289", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:58.505998Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:08:41.413Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:15:50", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3289", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ] }, "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3289", "datePublished": "2020-06-18T02:15:50.484251Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:08:41.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20118
Vulnerability from cvelistv5
Published
2023-04-05 16:05
Modified
2024-10-28 16:30
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device.
This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device.
Cisco has not and will not release software updates that address this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: 1.0.1.17 Version: 1.0.2.03 Version: 1.1.0.09 Version: 1.1.1.19 Version: 1.1.1.06 Version: 1.2.1.13 Version: 1.2.1.14 Version: 1.3.1.12 Version: 1.3.2.02 Version: 1.3.1.10 Version: 1.4.2.15 Version: 1.4.2.17 Version: 1.4.2.19 Version: 1.4.2.20 Version: 1.4.2.22 Version: 1.5.1.05 Version: 1.5.1.11 Version: 1.5.1.13 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-sbr042-multi-vuln-ej76Pke5", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20118", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T16:19:01.250803Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T16:30:04.733Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device.\r\n\r This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device.\r\n\r Cisco has not and will not release software updates that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for vulnerabilities CVE-2023-20025 and CVE-2023-20026 that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:46.788Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sbr042-multi-vuln-ej76Pke5", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5" } ], "source": { "advisory": "cisco-sa-sbr042-multi-vuln-ej76Pke5", "defects": [ "CSCwe41652" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20118", "datePublished": "2023-04-05T16:05:41.067Z", "dateReserved": "2022-10-27T18:47:50.345Z", "dateUpdated": "2024-10-28T16:30:04.733Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20147
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 15:59
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.030Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20147", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:34:47.693942Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:59:00.487Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20147", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:59:00.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3295
Vulnerability from cvelistv5
Published
2020-06-18 02:16
Modified
2024-11-15 17:07
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3295", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:45.512614Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:07:25.834Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:16:17", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3295", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ] }, "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3295", "datePublished": "2020-06-18T02:16:17.996974Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:07:25.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20142
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 15:59
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.794Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20142", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:35:04.350255Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:59:32.870Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20142", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:59:32.870Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20516
Vulnerability from cvelistv5
Published
2024-10-02 16:55
Modified
2024-10-02 17:25
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: 4.0.2.08-tm Version: 4.2.3.08 Version: 4.1.1.01 Version: 4.2.3.03 Version: 3.0.0.1-tm Version: 4.1.0.02-tm Version: 4.2.3.09 Version: 3.0.2.01-tm Version: 4.2.3.10 Version: 3.0.0.19-tm Version: 4.2.3.06 Version: 4.2.2.08 Version: 4.0.3.03-tm Version: 4.0.0.7 Version: 4.2.1.02 Version: 4.2.3.07 Version: 4.0.4.02-tm Version: 1.3.12.19-tm Version: 1.3.12.6-tm Version: 1.3.13.02-tm Version: 1.3.1.10 Version: 1.2.1.13 Version: 1.1.1.19 Version: 1.4.2.15 Version: 1.5.1.05 Version: 1.0.2.03 Version: 1.1.0.09 Version: 1.2.1.14 Version: 1.3.2.02 Version: 1.3.1.12 Version: 1.0.1.17 Version: 1.4.2.19 Version: 1.1.1.06 Version: 1.4.2.20 Version: 1.4.2.22 Version: 1.4.2.17 Version: 4.2.3.14 Version: 1.5.1.11 Version: 1.5.1.13 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20516", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T17:17:49.883022Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T17:25:54.379Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:55:52.185Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "source": { "advisory": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "defects": [ "CSCwm48770" ], "discovery": "EXTERNAL" }, "title": "Cisco Small Business RV042, RV042G, RV320, and RV325 Denial of Service Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20516", "datePublished": "2024-10-02T16:55:52.185Z", "dateReserved": "2023-11-08T15:08:07.689Z", "dateUpdated": "2024-10-02T17:25:54.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3292
Vulnerability from cvelistv5
Published
2020-06-18 02:16
Modified
2024-11-15 17:08
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.724Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3292", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:49.277069Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:08:02.787Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:16:03", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3292", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ] }, "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3292", "datePublished": "2020-06-18T02:16:04.053598Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:08:02.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20523
Vulnerability from cvelistv5
Published
2024-10-02 16:57
Modified
2024-10-02 17:25
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: 4.0.2.08-tm Version: 4.2.3.08 Version: 4.1.1.01 Version: 4.2.3.03 Version: 3.0.0.1-tm Version: 4.1.0.02-tm Version: 4.2.3.09 Version: 3.0.2.01-tm Version: 4.2.3.10 Version: 3.0.0.19-tm Version: 4.2.3.06 Version: 4.2.2.08 Version: 4.0.3.03-tm Version: 4.0.0.7 Version: 4.2.1.02 Version: 4.2.3.07 Version: 4.0.4.02-tm Version: 1.3.12.19-tm Version: 1.3.12.6-tm Version: 1.3.13.02-tm Version: 1.3.1.10 Version: 1.2.1.13 Version: 1.1.1.19 Version: 1.4.2.15 Version: 1.5.1.05 Version: 1.0.2.03 Version: 1.1.0.09 Version: 1.2.1.14 Version: 1.3.2.02 Version: 1.3.1.12 Version: 1.0.1.17 Version: 1.4.2.19 Version: 1.1.1.06 Version: 1.4.2.20 Version: 1.4.2.22 Version: 1.4.2.17 Version: 4.2.3.14 Version: 1.5.1.11 Version: 1.5.1.13 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20523", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T17:17:45.741625Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T17:25:39.673Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:57:35.516Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "source": { "advisory": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "defects": [ "CSCwm48770" ], "discovery": "EXTERNAL" }, "title": "Cisco Small Business RV042, RV042G, RV320, and RV325 Denial of Service Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20523", "datePublished": "2024-10-02T16:57:35.516Z", "dateReserved": "2023-11-08T15:08:07.690Z", "dateUpdated": "2024-10-02T17:25:39.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3288
Vulnerability from cvelistv5
Published
2020-06-18 02:15
Modified
2024-11-15 17:08
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3288", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:59.837239Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:08:51.996Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:15:45", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3288", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ] }, "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3288", "datePublished": "2020-06-18T02:15:45.555572Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:08:51.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1827
Vulnerability from cvelistv5
Published
2019-04-04 15:25
Modified
2024-11-21 19:40
Severity ?
EPSS score ?
Summary
A vulnerability in the Online Help web service of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the service. The vulnerability exists because the Online Help web service of an affected device insufficiently validates user-supplied input. An attacker could exploit this vulnerability by persuading a user of the service to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected service or access sensitive browser-based information.This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-xss | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107776 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: unspecified < 1.4.2.22 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:42.868Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190404 Cisco Small Business RV320 and RV325 Routers Online Help Reflected Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-xss" }, { "name": "107776", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107776" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1827", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:59:41.868093Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:40:52.916Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "lessThan": "1.4.2.22", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Online Help web service of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the service. The vulnerability exists because the Online Help web service of an affected device insufficiently validates user-supplied input. An attacker could exploit this vulnerability by persuading a user of the service to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected service or access sensitive browser-based information.This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-05T10:06:05", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190404 Cisco Small Business RV320 and RV325 Routers Online Help Reflected Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-xss" }, { "name": "107776", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107776" } ], "source": { "advisory": "cisco-sa-20190404-rv-xss", "defect": [ [ "CSCvp09589" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV320 and RV325 Routers Online Help Reflected Cross-Site Scripting Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-04-04T14:00:00-0700", "ID": "CVE-2019-1827", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV320 and RV325 Routers Online Help Reflected Cross-Site Scripting Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "1.4.2.22" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Online Help web service of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the service. The vulnerability exists because the Online Help web service of an affected device insufficiently validates user-supplied input. An attacker could exploit this vulnerability by persuading a user of the service to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected service or access sensitive browser-based information.This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.1", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "20190404 Cisco Small Business RV320 and RV325 Routers Online Help Reflected Cross-Site Scripting Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190404-rv-xss" }, { "name": "107776", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107776" } ] }, "source": { "advisory": "cisco-sa-20190404-rv-xss", "defect": [ [ "CSCvp09589" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1827", "datePublished": "2019-04-04T15:25:17.558243Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:40:52.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20517
Vulnerability from cvelistv5
Published
2024-10-02 16:56
Modified
2024-10-02 17:25
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: 4.0.2.08-tm Version: 4.2.3.08 Version: 4.1.1.01 Version: 4.2.3.03 Version: 3.0.0.1-tm Version: 4.1.0.02-tm Version: 4.2.3.09 Version: 3.0.2.01-tm Version: 4.2.3.10 Version: 3.0.0.19-tm Version: 4.2.3.06 Version: 4.2.2.08 Version: 4.0.3.03-tm Version: 4.0.0.7 Version: 4.2.1.02 Version: 4.2.3.07 Version: 4.0.4.02-tm Version: 1.3.12.19-tm Version: 1.3.12.6-tm Version: 1.3.13.02-tm Version: 1.3.1.10 Version: 1.2.1.13 Version: 1.1.1.19 Version: 1.4.2.15 Version: 1.5.1.05 Version: 1.0.2.03 Version: 1.1.0.09 Version: 1.2.1.14 Version: 1.3.2.02 Version: 1.3.1.12 Version: 1.0.1.17 Version: 1.4.2.19 Version: 1.1.1.06 Version: 1.4.2.20 Version: 1.4.2.22 Version: 1.4.2.17 Version: 4.2.3.14 Version: 1.5.1.11 Version: 1.5.1.13 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20517", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T17:17:47.778863Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T17:25:46.768Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:56:02.025Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "source": { "advisory": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "defects": [ "CSCwm48770" ], "discovery": "EXTERNAL" }, "title": "Cisco Small Business RV042, RV042G, RV320, and RV325 Denial of Service Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20517", "datePublished": "2024-10-02T16:56:02.025Z", "dateReserved": "2023-11-08T15:08:07.689Z", "dateUpdated": "2024-10-02T17:25:46.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20524
Vulnerability from cvelistv5
Published
2024-10-02 16:57
Modified
2024-10-02 17:25
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: 4.0.2.08-tm Version: 4.2.3.08 Version: 4.1.1.01 Version: 4.2.3.03 Version: 3.0.0.1-tm Version: 4.1.0.02-tm Version: 4.2.3.09 Version: 3.0.2.01-tm Version: 4.2.3.10 Version: 3.0.0.19-tm Version: 4.2.3.06 Version: 4.2.2.08 Version: 4.0.3.03-tm Version: 4.0.0.7 Version: 4.2.1.02 Version: 4.2.3.07 Version: 4.0.4.02-tm Version: 1.3.12.19-tm Version: 1.3.12.6-tm Version: 1.3.13.02-tm Version: 1.3.1.10 Version: 1.2.1.13 Version: 1.1.1.19 Version: 1.4.2.15 Version: 1.5.1.05 Version: 1.0.2.03 Version: 1.1.0.09 Version: 1.2.1.14 Version: 1.3.2.02 Version: 1.3.1.12 Version: 1.0.1.17 Version: 1.4.2.19 Version: 1.1.1.06 Version: 1.4.2.20 Version: 1.4.2.22 Version: 1.4.2.17 Version: 4.2.3.14 Version: 1.5.1.11 Version: 1.5.1.13 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20524", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T17:17:43.563003Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T17:25:33.476Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:57:45.406Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "source": { "advisory": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "defects": [ "CSCwm48770" ], "discovery": "EXTERNAL" }, "title": "Cisco Small Business RV042, RV042G, RV320, and RV325 Denial of Service Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20524", "datePublished": "2024-10-02T16:57:45.406Z", "dateReserved": "2023-11-08T15:08:07.690Z", "dateUpdated": "2024-10-02T17:25:33.476Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6358
Vulnerability from cvelistv5
Published
2017-10-12 15:00
Modified
2024-08-06 07:22
Severity ?
EPSS score ?
Summary
Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/566724 | third-party-advisory, x_refsource_CERT-VN | |
http://www.securitytracker.com/id/1034258 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/78047 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1034255 | vdb-entry, x_refsource_SECTRACK | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1034257 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id/1034256 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:22:20.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#566724", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/566724" }, { "name": "1034258", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034258" }, { "name": "78047", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/78047" }, { "name": "1034255", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034255" }, { "name": "20151125 Multiple Cisco Products Confidential Information Decryption Man-in-the-Middle Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci" }, { "name": "1034257", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034257" }, { "name": "1034256", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034256" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-12T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "VU#566724", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/566724" }, { "name": "1034258", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034258" }, { "name": "78047", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/78047" }, { "name": "1034255", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034255" }, { "name": "20151125 Multiple Cisco Products Confidential Information Decryption Man-in-the-Middle Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci" }, { "name": "1034257", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034257" }, { "name": "1034256", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034256" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-6358", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Cisco embedded devices use hardcoded X.509 certificates and SSH host keys embedded in the firmware, which allows remote attackers to defeat cryptographic protection mechanisms and conduct man-in-the-middle attacks by leveraging knowledge of these certificates and keys from another installation, aka Bug IDs CSCuw46610, CSCuw46620, CSCuw46637, CSCuw46654, CSCuw46665, CSCuw46672, CSCuw46677, CSCuw46682, CSCuw46705, CSCuw46716, CSCuw46979, CSCuw47005, CSCuw47028, CSCuw47040, CSCuw47048, CSCuw47061, CSCuw90860, CSCuw90869, CSCuw90875, CSCuw90881, CSCuw90899, and CSCuw90913." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#566724", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/566724" }, { "name": "1034258", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034258" }, { "name": "78047", "refsource": "BID", "url": "http://www.securityfocus.com/bid/78047" }, { "name": "1034255", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034255" }, { "name": "20151125 Multiple Cisco Products Confidential Information Decryption Man-in-the-Middle Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151125-ci" }, { "name": "1034257", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034257" }, { "name": "1034256", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034256" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-6358", "datePublished": "2017-10-12T15:00:00", "dateReserved": "2015-08-17T00:00:00", "dateUpdated": "2024-08-06T07:22:20.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20518
Vulnerability from cvelistv5
Published
2024-10-02 16:56
Modified
2024-10-02 19:12
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
This vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: 4.0.2.08-tm Version: 4.2.3.08 Version: 4.1.1.01 Version: 4.2.3.03 Version: 3.0.0.1-tm Version: 4.1.0.02-tm Version: 4.2.3.09 Version: 3.0.2.01-tm Version: 4.2.3.10 Version: 3.0.0.19-tm Version: 4.2.3.06 Version: 4.2.2.08 Version: 4.0.3.03-tm Version: 4.0.0.7 Version: 4.2.1.02 Version: 4.2.3.07 Version: 4.0.4.02-tm Version: 1.3.12.19-tm Version: 1.3.12.6-tm Version: 1.3.13.02-tm Version: 1.3.1.10 Version: 1.2.1.13 Version: 1.1.1.19 Version: 1.4.2.15 Version: 1.5.1.05 Version: 1.0.2.03 Version: 1.1.0.09 Version: 1.2.1.14 Version: 1.3.2.02 Version: 1.3.1.12 Version: 1.0.1.17 Version: 1.4.2.19 Version: 1.1.1.06 Version: 1.4.2.20 Version: 1.4.2.22 Version: 1.4.2.17 Version: 4.2.3.14 Version: 1.5.1.11 Version: 1.5.1.13 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "small_business_rv_series_router_firmware", "vendor": "cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20518", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T18:56:15.521738Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T19:12:22.612Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "4.0.2.08-tm" }, { "status": "affected", "version": "4.2.3.08" }, { "status": "affected", "version": "4.1.1.01" }, { "status": "affected", "version": "4.2.3.03" }, { "status": "affected", "version": "3.0.0.1-tm" }, { "status": "affected", "version": "4.1.0.02-tm" }, { "status": "affected", "version": "4.2.3.09" }, { "status": "affected", "version": "3.0.2.01-tm" }, { "status": "affected", "version": "4.2.3.10" }, { "status": "affected", "version": "3.0.0.19-tm" }, { "status": "affected", "version": "4.2.3.06" }, { "status": "affected", "version": "4.2.2.08" }, { "status": "affected", "version": "4.0.3.03-tm" }, { "status": "affected", "version": "4.0.0.7" }, { "status": "affected", "version": "4.2.1.02" }, { "status": "affected", "version": "4.2.3.07" }, { "status": "affected", "version": "4.0.4.02-tm" }, { "status": "affected", "version": "1.3.12.19-tm" }, { "status": "affected", "version": "1.3.12.6-tm" }, { "status": "affected", "version": "1.3.13.02-tm" }, { "status": "affected", "version": "1.3.1.10" }, { "status": "affected", "version": "1.2.1.13" }, { "status": "affected", "version": "1.1.1.19" }, { "status": "affected", "version": "1.4.2.15" }, { "status": "affected", "version": "1.5.1.05" }, { "status": "affected", "version": "1.0.2.03" }, { "status": "affected", "version": "1.1.0.09" }, { "status": "affected", "version": "1.2.1.14" }, { "status": "affected", "version": "1.3.2.02" }, { "status": "affected", "version": "1.3.1.12" }, { "status": "affected", "version": "1.0.1.17" }, { "status": "affected", "version": "1.4.2.19" }, { "status": "affected", "version": "1.1.1.06" }, { "status": "affected", "version": "1.4.2.20" }, { "status": "affected", "version": "1.4.2.22" }, { "status": "affected", "version": "1.4.2.17" }, { "status": "affected", "version": "4.2.3.14" }, { "status": "affected", "version": "1.5.1.11" }, { "status": "affected", "version": "1.5.1.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:56:12.546Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV" } ], "source": { "advisory": "cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", "defects": [ "CSCwm48770" ], "discovery": "EXTERNAL" }, "title": "Cisco Small Business RV042, RV042G, RV320, and RV325 Remote Command Execution Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20518", "datePublished": "2024-10-02T16:56:12.546Z", "dateReserved": "2023-11-08T15:08:07.689Z", "dateUpdated": "2024-10-02T19:12:22.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3287
Vulnerability from cvelistv5
Published
2020-06-18 02:15
Modified
2024-11-15 17:09
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3287", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:24:01.050156Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:09:03.376Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:15:41", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3287", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ] }, "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3287", "datePublished": "2020-06-18T02:15:41.213447Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:09:03.376Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20137
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 16:00
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20137", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:35:12.403435Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T16:00:19.865Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20137", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T16:00:19.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20151
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 15:58
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:34.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20151", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:34:31.698264Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:58:27.245Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20151", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:58:27.245Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3296
Vulnerability from cvelistv5
Published
2020-06-18 02:16
Modified
2024-11-15 17:07
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3296", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:23:44.319650Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:07:13.549Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-18T02:16:22", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ], "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-17T16:00:00", "ID": "CVE-2020-3296", "STATE": "PUBLIC", "TITLE": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Small Business RV Series Router Firmware", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "20200617 Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz" } ] }, "source": { "advisory": "cisco-sa-rv-routers-stack-vUxHmnNz", "defect": [ [ "CSCvt26525", "CSCvt26555", "CSCvt26591", "CSCvt26619", "CSCvt26643", "CSCvt26659", "CSCvt26663", "CSCvt26705", "CSCvt26718", "CSCvt26725", "CSCvt26729", "CSCvt29381", "CSCvt29385", "CSCvt29388", "CSCvt29396", "CSCvt29398", "CSCvt29400", "CSCvt29403", "CSCvt29414", "CSCvt29416", "CSCvt29421", "CSCvt29423" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3296", "datePublished": "2020-06-18T02:16:22.456163Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:07:13.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20150
Vulnerability from cvelistv5
Published
2023-04-05 00:00
Modified
2024-10-25 15:58
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Small Business RV Series Router Firmware |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:34.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20150", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:34:38.425731Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T15:58:34.223Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Small Business RV Series Router Firmware ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-05T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230405 Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W" } ], "source": { "advisory": "cisco-sa-rv-stored-xss-vqz7gC8W", "defect": [ [ "CSCwe21294", "CSCwe75298", "CSCwe75302", "CSCwe75304", "CSCwe75324", "CSCwe75338", "CSCwe75341", "CSCwe75346", "CSCwe75348", "CSCwe75352", "CSCwe75355", "CSCwe75367", "CSCwe75369", "CSCwe75375", "CSCwe75377" ] ], "discovery": "INTERNAL" }, "title": "Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20150", "datePublished": "2023-04-05T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T15:58:34.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }