First published: Wed Jun 17 2020(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8
Credit: Kai Cheng for reporting these vulnerabilities.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Small Business RV Series Router Firmware | ||
Cisco Small Business RV Series Router Firmware | ||
Cisco Small Business RV Series Router Firmware | ||
Cisco Small Business RV Series Router Firmware | ||
Cisco Small Business RV082 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of cisco-sa-rv-routers-Rj5JRfF8 is classified as high due to the potential for remote command execution.
To fix cisco-sa-rv-routers-Rj5JRfF8, ensure that your Cisco RV320, RV325, RV016, RV042, or RV082 routers are updated to the latest firmware version provided by Cisco.
The impacted devices in cisco-sa-rv-routers-Rj5JRfF8 include Cisco Small Business RV320, RV325, RV016, RV042, and RV082 routers.
Due to cisco-sa-rv-routers-Rj5JRfF8, an authenticated attacker can execute arbitrary commands on the affected routers.
Yes, exploitation of the vulnerabilities in cisco-sa-rv-routers-Rj5JRfF8 requires administrative privileges for authentication.