First published: Thu Jan 19 2023(Updated: )
A vulnerability in the web-based management interface of Cisco Small Business Routers RV042 Series could allow an authenticated, remote attacker to inject arbitrary commands on an affected device. This vulnerability is due to improper validation of user input fields within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Rv016 Firmware | ||
Cisco Rv016 | ||
Cisco Rv042 Firmware | ||
Cisco Rv042 | ||
Cisco Rv042g Firmware | ||
Cisco Rv042g | ||
Cisco Rv082 Firmware | ||
Cisco Rv082 | ||
All of | ||
Cisco Rv016 Firmware | ||
Cisco Rv016 | ||
All of | ||
Cisco Rv042 Firmware | ||
Cisco Rv042 | ||
All of | ||
Cisco Rv042g Firmware | ||
Cisco Rv042g | ||
All of | ||
Cisco Rv082 Firmware | ||
Cisco Rv082 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Small Business Routers RV042 Series vulnerability is CVE-2023-20026.
CVE-2023-20026 has a severity rating of 7.2, which is considered high.
The affected software for CVE-2023-20026 includes Cisco Rv016 Firmware, Cisco Rv042 Firmware, and Cisco Rv042g Firmware.
CVE-2023-20026 allows an authenticated, remote attacker to inject arbitrary commands on an affected device by exploiting improper validation of user input fields within incoming HTTP packets.
Yes, Cisco has provided a fix for CVE-2023-20026. It is recommended to apply the latest firmware update from Cisco to mitigate the vulnerability.