First published: Wed Aug 04 2021(Updated: )
Multiple vulnerabilities in the web-based management interface of the Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an attacker to do the following: For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy
Credit: swing Chaitin Security Research Lab for reporting these vulnerabilities
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco RV340W Firmware | ||
Cisco RV340W Firmware | ||
Cisco RV345P Firmware | ||
Cisco RV345P Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy is considered high due to the potential for remote code execution and denial of service.
To fix cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy, ensure that you update your Cisco RV340, RV340W, RV345, or RV345P routers to the latest firmware version provided by Cisco.
The devices affected by cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy include the Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers.
Yes, cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy can potentially lead to unauthorized access due to vulnerabilities in the web-based management interface.
cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy can enable attacks such as remote code execution and denial of service, threatening the integrity and availability of the affected devices.