RV Series Routers Command Injection Vulnerabilities

Risk:
high
Damage:
high
Platform(s):
Cisco Routers
Advisory ID:
ngCERT-2020-0015
Version:
N/A
CVE:
CVE-2020-3274, CVE-2020-3275, CVE-2020-3276, CVE-2020-3277, CVE-2020-3278, CVE-2020-3279
Published:
August 5, 2020

Summary


Researchers discovered multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers. This vulnerabilities could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device.

Description & Consequence


These vulnerabilities is due to improper validation of user-supplied input to scripts of the web-based management interface. A malicious attacker possessing administrative privileges sufficient to log in to the web-based management interface can exploit each vulnerability by sending malicious requests to an affected device.

It is confirmed that the vulnerabilities affect the following Cisco Small Business routers and firmware;

  • RV016 Multi-WAN VPN: 4.2.3.10 and earlier
  • RV042 Dual WAN VPN: 4.2.3.10 and earlier
  • RV042G Dual Gigabit WAN VPN: 4.2.3.10 and earlier
  • RV082 Dual WAN VPN: 4.2.3.10 and earlier
  • RV320 Dual Gigabit WAN VPN: 1.5.1.05 and earlie
  • RV325 Dual Gigabit WAN VPN: 1.5.1.05 and earlier

At a successful exploit, a malicious attacker can execute arbitrary commands with root privileges on the underlying operating system.

Solution


  • Cisco fixed these vulnerabilities in Cisco RV320 and RV325 Dual Gigabit WAN VPN Routers Firmware Release 1.5.1.11.
  • Cisco have also fixed these vulnerabilities in Cisco RV016, RV042, and RV082 Routers Firmware Release 4.2.3.14.
  • Leverage the hyperlink section of this advisory for information on upgrade and fixes.

Reference


Revision


Related Articles