#VU60253 OS Command Injection in Cisco Systems, Inc products - CVE-2022-20706

 

#VU60253 OS Command Injection in Cisco Systems, Inc products - CVE-2022-20706

Published: February 2, 2022 / Updated: February 22, 2022


Vulnerability identifier: #VU60253
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2022-20706
CWE-ID: CWE-78
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
Cisco RV340 Dual WAN Gigabit VPN Router
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router
Cisco RV345 Dual WAN Gigabit VPN Router
Cisco RV345P Dual WAN Gigabit VPN Router
Software vendor:
Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the Open Plug and Play (PnP) module of Cisco Small Business RV Series Routers. A remote unauthenticated attacker can execute arbitrary commands on the underlying Linux operating system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system but requires a man-in-the-middle position or having an established foothold on a specific network device that is connected to the vulnerable router.


Remediation

Install updates from vendor's website.

External links