#VU60259 Input validation error in Cisco Systems, Inc products - CVE-2022-20711

 

#VU60259 Input validation error in Cisco Systems, Inc products - CVE-2022-20711

Published: February 3, 2022


Vulnerability identifier: #VU60259
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2022-20711
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Cisco RV340 Dual WAN Gigabit VPN Router
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router
Cisco RV345 Dual WAN Gigabit VPN Router
Cisco RV345P Dual WAN Gigabit VPN Router
Software vendor:
Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to overwrite arbitrary files on the system.

The vulnerability exists due to insufficient validation of user-supplied input for specific components of the web UI. A remote non-authenticated attacker can send specially crafted HTTP request to the affected device and overwrite certain files, served by the web UI process. Successful exploitation of the vulnerability may allow an attacker to exfiltrate information.

Remediation

Install updates from vendor's website.

External links