#VU66106 Command Injection in Cisco Systems, Inc products - CVE-2022-20827

 

#VU66106 Command Injection in Cisco Systems, Inc products - CVE-2022-20827

Published: August 4, 2022


Vulnerability identifier: #VU66106
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2022-20827
CWE-ID: CWE-77
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Cisco Small Business RV160 Series VPN Router
Cisco Small Business RV160W Wireless-AC VPN Router
Cisco Small Business RV260 VPN Router
Cisco Small Business RV260P VPN Router with POE
Cisco Small Business RV260W Wireless-AC VPN Router
Cisco RV340 Dual WAN Gigabit VPN Router
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router
Cisco RV345 Dual WAN Gigabit VPN Router
Cisco RV345P Dual WAN Gigabit VPN Router
Software vendor:
Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists due to improper input validation in the web filter database update feature. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary commands on the target system with root privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links