Lucene search

K
ciscoCiscoCISCO-SA-RV160-260-RCE-XZEFKNHF
HistoryFeb 03, 2021 - 4:00 p.m.

Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers Remote Code Execution Vulnerabilities

2021-02-0316:00:00
tools.cisco.com
36

0.003 Low

EPSS

Percentile

71.2%

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device.

These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device.

Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf”]

Affected configurations

Vulners
Node
ciscosmall_business_rv_series_router_firmwareMatchany
OR
ciscosmall_business_rv_series_router_firmwareMatchany

0.003 Low

EPSS

Percentile

71.2%

Related for CISCO-SA-RV160-260-RCE-XZEFKNHF