Versio.io

CVE-2022-20799

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 04-05-2022 07:15
Last modified: - 11-05-2022 09:57
Total changes: - 2

Description

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV340 and RV345 Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Low
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
High
Privileges required
Unchanged
Scope
None
User interaction
7.2
Base score
1.2
5.9
Exploitability score
Impact score
 

Verification logic

OR
AND
OR
vendor=cisco AND product=rv340_firmware AND versionEndExcluding=1.0.03.27
OR
vendor=cisco AND product=rv340 AND version=-
AND
OR
vendor=cisco AND product=rv340w_firmware AND versionEndExcluding=1.0.03.27
OR
vendor=cisco AND product=rv340w AND version=-
AND
OR
vendor=cisco AND product=rv345_firmware AND versionEndExcluding=1.0.03.27
OR
vendor=cisco AND product=rv345 AND version=-
AND
OR
vendor=cisco AND product=rv345p_firmware AND versionEndExcluding=1.0.03.27
OR
vendor=cisco AND product=rv345p AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2022-20799

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.