#VU60252 Improper Authentication in Cisco Systems, Inc products - CVE-2022-20705

 

#VU60252 Improper Authentication in Cisco Systems, Inc products - CVE-2022-20705

Published: February 2, 2022 / Updated: February 15, 2023


Vulnerability identifier: #VU60252
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2022-20705
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Cisco RV340 Dual WAN Gigabit VPN Router
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router
Cisco RV345 Dual WAN Gigabit VPN Router
Cisco RV345P Dual WAN Gigabit VPN Router
Software vendor:
Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in the session management of the web UI. A remote non-authenticated attacker can brute force to determine a current session identifier and then reuse it to take over an ongoing session or by crafting a new, valid session identifier and bypassing the whole authentication mechanism.

Successful exploitation of the vulnerability may allow an attacker to compromise the affected device.

Remediation

Install updates from vendor's website.

External links