First published: Wed May 05 2021(Updated: )
A vulnerability in the internal message processing of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, local attacker to run arbitrary commands with root privileges on the underlying operating system (OS). This vulnerability exists because an internal messaging service does not properly sanitize input. An attacker could exploit this vulnerability by first authenticating to the device and then sending a crafted request to the internal service. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying OS. To exploit this vulnerability, the attacker must have valid Administrator credentials for the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-34x-privesc-GLN8ZAQE
Credit: T. Shiomitsu IoT Inspector Research Lab
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV340W Firmware | ||
Cisco RV340W Firmware | ||
Cisco RV345P Firmware | ||
Cisco RV345P Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the cisco-sa-rv-34x-privesc-GLN8ZAQE vulnerability is considered critical due to its potential to allow local attackers to gain root privileges.
To fix the cisco-sa-rv-34x-privesc-GLN8ZAQE vulnerability, apply the latest firmware updates provided by Cisco for affected RV340, RV340W, RV345, and RV345P models.
The cisco-sa-rv-34x-privesc-GLN8ZAQE vulnerability affects users of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers.
The cisco-sa-rv-34x-privesc-GLN8ZAQE vulnerability involves a privilege escalation attack that allows an authenticated, local attacker to execute arbitrary commands.
No specific workarounds are recommended for cisco-sa-rv-34x-privesc-GLN8ZAQE; the best remediation is to update to the latest firmware.