First published: Wed Oct 02 2024(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges and execute arbitrary commands on the underlying operating system of an
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Small Business RV340 Series Routers | ||
Cisco RV340W | ||
Cisco Small Business RV345P | ||
Cisco RV345P |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-rv34x-privesc-rce-qE33TCms is critical due to the potential for remote command execution and privilege escalation.
To fix cisco-sa-rv34x-privesc-rce-qE33TCms, update the affected Cisco Small Business RV340, RV340W, RV345, and RV345P routers to the latest software version provided by Cisco.
The devices affected by cisco-sa-rv34x-privesc-rce-qE33TCms are the Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers.
cisco-sa-rv34x-privesc-rce-qE33TCms allows an authenticated remote attacker to elevate privileges and execute arbitrary commands on the underlying operating system.
Currently, there are no specific workarounds for cisco-sa-rv34x-privesc-rce-qE33TCms other than applying the security patch.