The networking equipment maker Cisco rolled out patches for multiple critical vulnerabilities in Cisco RV series routers. Cisco marked 15 vulnerabilities in its advisory, of which three carried the highest CVSS score of 10.0. Advisory also says that the successful exploitation of the vulnerabilities could lead to attacks like arbitrary code execution, privilege escalation, bypass authentication and authorization protections, and Denial of Service (DoS). It is very important to know more about the vulnerabilities for a user who uses Cisco’s RV series of routers in their network. Let’s see the list of vulnerabilities and their impact, along with how to fix those critical vulnerabilities in the affected Cisco RV series of routers.
Table of Contents
List Of Routers Affected By The Vulnerabilities:
Here are the list of routers vulnerable to flaws.
RV160 and RV260 Series Routers v1.0.01.05 and earlier are affected by these vulnerabilities. RV340 and RV345 Series Routers c1.0.03.24 are affected by these vulnerabilities.
Router Modules | Vulnerabilities |
RV160 VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 |
RV160W Wireless-AC VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 |
RV260 VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 |
RV260P VPN Routers with PoE | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 |
RV260W Wireless-AC VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 |
RV340 Dual WAN Gigabit VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 CVE-2022-20699 CVE-2022-20707 CVE-2022-20708 CVE-2022-20709 CVE-2022-20711 CVE-2022-20749 |
RV340W Dual WAN Gigabit Wireless-AC VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 CVE-2022-20699 CVE-2022-20707 CVE-2022-20708 CVE-2022-20709 CVE-2022-20711 CVE-2022-20749 |
RV345 Dual WAN Gigabit VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 CVE-2022-20699 CVE-2022-20707 CVE-2022-20708 CVE-2022-20709 CVE-2022-20711 CVE-2022-20749 |
RV345P Dual WAN Gigabit POE VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 CVE-2022-20699 CVE-2022-20707 CVE-2022-20708 CVE-2022-20709 CVE-2022-20711 CVE-2022-20749 |
List Of Vulnerabilities In Cisco RV Series Routers:
Here is the list of vulnerabilities published in the security advisory.
- CVE-2022-20699: This vulnerability allows remote attackers to perform an unauthenticated arbitrary code execution affected devices. The flaw is due to improper boundary checks when processing specific HTTP requests, so it can be exploited by crafting a malicious HTTP request. Cisco routers RV340, RV340W, RV345, and RV345P are affected by this vulnerability.
- CVE-2022-20700, CVE-2022-20701, CVE-2022-20702: This flaw allows remote attackers to elevate privileges to root. This vulnerability is due to insufficient authorization enforcement mechanisms. An attacker could exploit this vulnerability by submitting specific commands. All the
- CVE-2022-20703: This flaw allows attackers to install and load malicious software images on the affected devices. This is due to improper verification of software images.
- CVE-2022-20704: Due to improper validation of the SSL server certificate, attackers can view and modify the information shared between affected devices. This vulnerability gives an opportunity for attackers to carry out the man-in-the-middle attack and intercept the traffic.
- CVE-2022-20705: Vulnerability in the session management of the web UI permits an unauthenticated, remote attacker to access web UI by bypassing authentication protections.
- CVE-2022-20706: The vulnerability is due to insufficient validation of user-supplied input in the router operating system’s Open Plug and Play (PnP) module. This allows a remote attacker to inject and execute arbitrary commands on the affected system. Attackers can exploit the flaws by sending malicious input to an affected device.
- CVE-2022-20707, CVE-2022-20708, CVE-2022-20749: The vulnerability is due to insufficient validation of user-supplied input in the web-based management interface of the affected routers. This allows a remote attacker to inject and execute arbitrary commands on the affected system. Attackers can exploit the flaws by sending malicious input to an affected device. Cisco routers RV340, RV340W, RV345, and RV345P are affected by this vulnerability.
- CVE-2022-20709: This vulnerability allows an attacker to upload arbitrary files due to insufficient authorization enforcement in the web-based management interface. The attacker can exploit this vulnerability by sending a crafted HTTP request. Cisco routers RV340, RV340W, RV345, and RV345P are affected by this vulnerability.
- CVE-2022-20710: Erroneously handled exceptions during failed login attempts to prevent legitimate logins. This causes a denial of service in login functionality in the web-based management interface. This vulnerability can be exploited by submitting a crafted HTTP packet.
- CVE-2022-20711: insufficient input validation of the web UI components allows attackers to overwrite certain files. Attackers can exploit the flaws by sending crafted HTTP requests to the vulnerable device. Cisco routers RV340, RV340W, RV345, and RV345P are affected by this vulnerability.
- CVE-2022-20712: This flaw allows remote attackers to execute arbitrary code. It happens when there are insufficient boundary checks in processing specific HTTP requests. Attackers can exploit the flaws by sending crafted HTTP requests to the vulnerable device.
Sl. No. | CVE ID: | CVSS Base Score | CVSS Vector: |
1 | CVE-2022-20699 | 10.0 Critical | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
2 | CVE-2022-20700 | 10.0 Critical | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3 | CVE-2022-20701 | 9.0 Critical | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N |
4 | CVE-2022-20702 | 6.0 Medium | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N |
5 | CVE-2022-20703 | 9.3 Critical | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
6 | CVE-2022-20704 | 4.8 Low | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
7 | CVE-2022-20705 | 5.3 Medium | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
8 | CVE-2022-20706 | 8.3 High | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H |
9 | CVE-2022-20708 | 10.0 Critical | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
10 | CVE-2022-20707 | 7.3 Medium | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
11 | CVE-2022-20749 | 7.3 Medium | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
12 | CVE-2022-20709 | 5.3 Medium | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
13 | CVE-2022-20710 | 5.3 Medium | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
14 | CVE-2022-20711 | 8.2 High | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N |
15 | CVE-2022-20712 | 7.3 Medium | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
Fix Vulnerabilities In Cisco RV Series Routers:
Vulnerabilities in RV160 and RV260 series routers are fixed in release no. TBD (Feb 2022) and RV340 and RV345 series routers are fixed in 1.0.03.26.
Since there is no workaround to fix these vulnerabilities, it is required to upgrade the firmware version of the router. Please visit the security advisories or contact Cisco TAC service for more details.
We hope this post will help you know about the Multiple Critical Vulnerabilities in Cisco RV Series Routers. Thanks for reading this threat post. Please share this post and help to secure the digital world. Visit our social media page in Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
原创文章,作者:ItWorker,如若转载,请注明出处:https://blog.ytso.com/270148.html