#VU60259 Input validation error in Cisco Systems, Inc products - CVE-2022-20711
Published: February 3, 2022
Vulnerability identifier: #VU60259
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2022-20711
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Cisco RV340 Dual WAN Gigabit VPN Router
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router
Cisco RV345 Dual WAN Gigabit VPN Router
Cisco RV345P Dual WAN Gigabit VPN Router
Cisco RV340 Dual WAN Gigabit VPN Router
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router
Cisco RV345 Dual WAN Gigabit VPN Router
Cisco RV345P Dual WAN Gigabit VPN Router
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to overwrite arbitrary files on the system.
The vulnerability exists due to insufficient validation of user-supplied input for specific components of the web UI. A remote non-authenticated attacker can send specially crafted HTTP request to the affected device and overwrite certain files, served by the web UI process. Successful exploitation of the vulnerability may allow an attacker to exfiltrate information.Remediation
Install updates from vendor's website.