First published: Wed Apr 05 2023(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV016 Multi-WAN VPN Firmware | ||
Cisco RV016 Multi-WAN VPN | ||
Cisco RV042G Firmware | ||
Cisco RV042 Dual WAN VPN Router | ||
Cisco RV042G | ||
Cisco RV042G Firmware | ||
Cisco RV082 Firmware | ||
Linksys RV082 | ||
Cisco RV320 Firmware | ||
Cisco RV320 Firmware | ||
Cisco RV325 firmware | ||
Cisco RV325 Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2023-20150.
The severity level of CVE-2023-20150 is medium (6.1).
The affected software for CVE-2023-20150 are Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers.
The vulnerability type of CVE-2023-20150 is cross-site scripting (XSS) attacks.
No, authentication is not required to exploit CVE-2023-20150.