SB2024100331 - Multiple vulnerabilities in Cisco Small Business RV042, RV042G, RV320 and RV325 Routers
Published: October 3, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 9 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2024-20516)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing HTTP packets. A remote administrator can send a specially crafted HTTP request, trigger stack-based buffer overflow and cause a denial of service condition on the target system.
2) Stack-based buffer overflow (CVE-ID: CVE-2024-20517)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing HTTP packets. A remote administrator can send a specially crafted HTTP request, trigger stack-based buffer overflow and cause a denial of service condition on the target system.
3) Heap-based buffer overflow (CVE-ID: CVE-2024-20518)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the web-based management interface. A remote administrator can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Heap-based buffer overflow (CVE-ID: CVE-2024-20519)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the web-based management interface. A remote administrator can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Heap-based buffer overflow (CVE-ID: CVE-2024-20520)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the web-based management interface. A remote administrator can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
6) Heap-based buffer overflow (CVE-ID: CVE-2024-20521)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the web-based management interface. A remote administrator can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Stack-based buffer overflow (CVE-ID: CVE-2024-20522)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing HTTP packets. A remote administrator can send a specially crafted HTTP request, trigger stack-based buffer overflow and cause a denial of service condition on the target system.
8) Stack-based buffer overflow (CVE-ID: CVE-2024-20523)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing HTTP packets. A remote administrator can send a specially crafted HTTP request, trigger stack-based buffer overflow and cause a denial of service condition on the target system.
9) Stack-based buffer overflow (CVE-ID: CVE-2024-20524)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing HTTP packets. A remote administrator can send a specially crafted HTTP request, trigger stack-based buffer overflow and cause a denial of service condition on the target system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.