Cisco small business routers need urgent patch

By
Follow google news

Remote code execution, denial of service.

Cisco has released patches for three vulnerabilities across 11 of its small business routers, two of which are rated “critical”.

Cisco small business routers need urgent patch

In an advisory, the networking giant said the vulnerabilities “could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device”.

“The vulnerabilities are dependent on one another. Exploitation of one of the vulnerabilities may be required to exploit another vulnerability," Cisco noted.

“In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.”

Two of the vulnerabilities, CVE-2022-20827 (CVSS score 9.0) and CVE-2022-20841 (CVSS score 8.3), affect nine devices in the RV160, RV260, RV340 and RV345 range. 

CVE-2022-20842 (CVSS score 9.8) affects devices in the RV340 and RV345 range only.

CVE-2022-20842 is a bug in the web-based management interface of the affected dual-WAN gigabit VPN routers.

An attacker can send crafted HTTP input to access the affected unit.

“A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a DoS condition,” the advisory stated.

CVE-2022-20827 is a vulnerability in the web filter database update feature of affected devices.

“This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting crafted input to the web filter database update feature," ”, the advisory stated.

"A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges."

Finally, CVE-2022-20841 is a bug in Open Plug-n-Play (PnP) module of affected devices.

It’s another input validation failure which, if exploited, could “allow the attacker to execute arbitrary commands on the underlying Linux operating system.

“To exploit this vulnerability, an attacker must leverage a man-in-the-middle position or have an established foothold on a specific network device that is connected to the affected router," Cisco said.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

National photo licence recognition system set to go live in 2025

National photo licence recognition system set to go live in 2025

Hackers using F5 devices to target US gov networks

Hackers using F5 devices to target US gov networks

Qantas says customer data released by cyber criminals

Qantas says customer data released by cyber criminals

Austrade to replace its data centre core network

Austrade to replace its data centre core network

Log In

  |  Forgot your password?