Thursday, August 4, 2022
HomeHackerA number of Flaws in Cisco Small Enterprise Routers Enable Distant Attackers

A number of Flaws in Cisco Small Enterprise Routers Enable Distant Attackers


Cisco Small Business Routers Flaw

Cisco has launched software program updates that handle a number of vulnerabilities in Cisco Small Enterprise VPN routers which permit an unauthenticated, distant attacker to execute arbitrary code or trigger a denial of service (DoS) situation on an affected machine.

Susceptible Merchandise

The vulnerabilities tracked as CVE-2022-20827 and CVE-2022-20841 have an effect on the next Cisco merchandise:

  • RV160 VPN Routers
  • RV160W Wi-fi-AC VPN Routers
  • RV260 VPN Routers
  • RV260P VPN Routers with PoE
  • RV260W Wi-fi-AC VPN Routers
  • RV340 Twin WAN Gigabit VPN Routers
  • RV340W Twin WAN Gigabit Wi-fi-AC VPN Routers
  • RV345 Twin WAN Gigabit VPN Routers
  • RV345P Twin WAN Gigabit POE VPN Routers

The vulnerability tracked as CVE-2022-20842 impacts the next Cisco merchandise:

  • RV340 Twin WAN Gigabit VPN Routers
  • RV340W Twin WAN Gigabit Wi-fi-AC VPN Routers
  • RV345 Twin WAN Gigabit VPN Routers
  • RV345P Twin WAN Gigabit POE VPN Routers

In an advisory, Cisco famous that “The vulnerabilities are depending on each other. Exploitation of one of many vulnerabilities could also be required to use one other vulnerability”.

“As well as, a software program launch that’s affected by one of many vulnerabilities is probably not affected by the opposite vulnerabilities”.

Cisco Small Enterprise RV Collection Routers Distant Code Execution and Denial of Service Vulnerability:

The flaw is tracked as (CVE-2022-20842) with the CVSS Base Rating: 9.8, discovered within the web-based administration interface of Cisco RV340, RV340W, RV345, and RV345P Twin WAN Gigabit VPN Routers.

Upon profitable exploitation of the vulnerability might enable an attacker to execute arbitrary code or trigger an affected machine to restart unexpectedly, leading to a denial of service (DoS) situation. An attacker might exploit this vulnerability by sending crafted HTTP enter to an affected machine.

The advisory point out that “The vulnerability is because of inadequate validation of user-supplied enter to the web-based administration interface”.

Cisco Small Enterprise RV Collection Routers Net Filter Database Replace Command Injection Vulnerability:

This vulnerability is tracked as (CVE-2022-20827) with the CVSS Base Rating: 9.0 discovered within the net filter database replace characteristic of Cisco Small Enterprise RV160, RV260, RV340, and RV345 Collection Routers.

This might enable an unauthenticated, distant attacker to carry out a command injection and execute instructions on the underlying working system with root privileges. It is because of inadequate enter validation.

“An attacker might exploit this vulnerability by submitting crafted enter to the net filter database replace characteristic”, the advisory acknowledged.

Cisco Small Enterprise RV Collection Routers Open Plug and Play Command Injection Vulnerability:

This flaw is tracked as (CVE-2022-20841) with the CVSS Base Rating: 8.3 discovered within the Open Plug and Play (PnP) module of Cisco Small Enterprise RV160, RV260, RV340, and RV345 Collection Routers.

The flaw might enable an attacker to inject and execute arbitrary instructions on the underlying working system. It is because of inadequate validation of user-supplied enter. Upon profitable exploitation, this might enable the attacker to execute arbitrary instructions on the underlying Linux working system.

Cisco says “An attacker should leverage a man-in-the-middle place or have a longtime foothold on a particular community machine that’s related to the affected router”.

Cisco Launched Patches to Tackle the Vulnerabilities

CVE-2022-20827 and CVE-2022-20841

Cisco Product Affected Releases First Fastened Launch
RV160 and RV260 Collection Routers Sooner than 1.0.01.05 Not weak
RV160 and RV260 Collection Routers 1.0.01.05 1.0.01.09
RV340 and RV345 Collection Routers Sooner than 1.0.03.26 Not weak
RV340 and RV345 Collection Routers 1.0.03.26 1.0.03.28

CVE-2022-20842

Cisco Product Affected Releases First Fastened Launch
RV340 and RV345 Collection Routers 1.0.03.26 and earlier 1.0.03.28

Cisco has launched patches for 3 vulnerabilities that are rated ‘Essential’ and ‘Excessive’ in severity. Cisco recommends upgrading to an applicable mounted software program launch and there aren’t any workarounds that handle these vulnerabilities.

You may comply with us on LinkedinTwitterFb for each day Cybersecurity updates.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments