Lucene search

K
ciscoCiscoCISCO-SA-RV-CODE-EXECUTION-9UVJR7K4
HistoryAug 04, 2021 - 4:00 p.m.

Cisco Small Business RV160 and RV260 Series VPN Routers Remote Command Execution Vulnerability

2021-08-0416:00:00
tools.cisco.com
59
cisco
small business
rv160
rv160w
rv260
rv260p
rv260w
vpn routers
remote
command execution
vulnerability
web-based management interface
unauthenticated
remote attacker
arbitrary commands
operating system
insufficient user input validation
crafted request
root-level privileges
software updates
cisco security advisory.

EPSS

0.003

Percentile

70.0%

A vulnerability in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device.

This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device using root-level privileges. Due to the nature of the vulnerability, only commands without parameters can be executed.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-code-execution-9UVJr7k4 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-code-execution-9UVJr7k4”]

Affected configurations

Vulners
Node
ciscosmall_business_rv_series_router_firmwareMatchany
OR
ciscosmall_business_rv_series_router_firmwareMatchany
VendorProductVersionCPE
ciscosmall_business_rv_series_router_firmwareanycpe:2.3:o:cisco:small_business_rv_series_router_firmware:any:*:*:*:*:*:*:*

EPSS

0.003

Percentile

70.0%

Related for CISCO-SA-RV-CODE-EXECUTION-9UVJR7K4