A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device.
The vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the affected device.
Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-q3rxHnvm ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-q3rxHnvm"]
{"id": "CISCO-SA-RV-RCE-Q3RXHNVM", "vendorId": null, "type": "cisco", "bulletinFamily": "software", "title": "Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability", "description": "A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device.\n\nThe vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the affected device.\n\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\nThis advisory is available at the following link:\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-q3rxHnvm [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-q3rxHnvm\"]", "published": "2021-04-07T16:00:00", "modified": "2021-04-07T16:00:00", "cvss": {"score": 9.8, "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "cvss2": {}, "cvss3": {}, "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-q3rxHnvm", "reporter": "Cisco", "references": ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-q3rxHnvm"], "cvelist": ["CVE-2021-1459"], "immutableFields": [], "lastseen": "2022-12-22T12:15:20", "viewCount": 46, "enchantments": {"dependencies": {"references": [{"type": "avleonov", "idList": ["AVLEONOV:B0F649A99B171AC3032AF71B1DCCFE34"]}, {"type": "cve", "idList": ["CVE-2021-1459"]}, {"type": "thn", "idList": ["THN:0B1D114F0E9F363E39DF54A7DB4324F9", "THN:F2A37F040B6AE81E1646EC5E0EE9EEA2"]}]}, "score": {"value": 4.5, "vector": "NONE"}, "backreferences": {"references": [{"type": "avleonov", "idList": ["AVLEONOV:B0F649A99B171AC3032AF71B1DCCFE34"]}, {"type": "cisa", "idList": ["CISA:AD42DF6ED0A3B564714D3D95BC2DC6A2"]}, {"type": "cve", "idList": ["CVE-2021-1459"]}, {"type": "thn", "idList": ["THN:F2A37F040B6AE81E1646EC5E0EE9EEA2"]}, {"type": "threatpost", "idList": ["THREATPOST:93C3A7BAD8906857857964D43A1F4FC8"]}]}, "exploitation": null, "vulnersScore": 4.5}, "_state": {"dependencies": 1671711741, "score": 1671711517, "affected_software_major_version": 1671712380}, "_internal": {"score_hash": "817b76a892fa64a60de8759179318eec"}, "affectedSoftware": [{"version": "any", "operator": "eq", "name": "cisco small business rv series router firmware"}, {"version": "any", "operator": "eq", "name": "cisco small business rv series router firmware"}], "vendorCvss": {"score": "9.8", "severity": "critical"}}
{"cve": [{"lastseen": "2022-08-05T19:24:09", "description": "A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the affected device. Cisco has not released software updates that address this vulnerability.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-04-08T04:15:00", "type": "cve", "title": "CVE-2021-1459", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-1459"], "modified": "2022-08-05T17:36:00", "cpe": ["cpe:/o:cisco:rv215w_firmware:1.0.3.55", "cpe:/o:cisco:rv130w_firmware:1.0.3.55", "cpe:/o:cisco:rv110w_firmware:1.0.3.55", "cpe:/o:cisco:rv130_firmware:1.0.3.55"], "id": "CVE-2021-1459", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1459", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:cisco:rv110w_firmware:1.0.3.55:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.55:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_firmware:1.0.3.55:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.55:*:*:*:*:*:*:*"]}], "thn": [{"lastseen": "2022-05-09T12:39:13", "description": "[](<https://thehackernews.com/new-images/img/a/AVvXsEjGZxTcYnkXh6HDVDSZkRgT1ih3facMYGJel-0ujHKyQ8ezAnyb3Dd3no9pCiXfcSQw9hmPDL-URQy1LkFV4JaCrFP6Gl4RVb_dsI-iwJRcIxDcw1WY-2oTqdi6HnpwnhLJz8I2sPLCCDZP45h4SjVZQLYlQ-bzcgd0czHvKFMNfDV-X4_3hNU-4qFb>)\n\nA critical vulnerability in Cisco Small Business Routers will not be patched by the networking equipment giant, since the devices reached end-of-life in 2019.\n\nTracked as **CVE-2021-34730** (CVSS score: 9.8), the issue resides in the routers' Universal Plug-and-Play (UPnP) service, enabling an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition.\n\nThe vulnerability, which the company said is due to improper validation of incoming UPnP traffic, could be abused to send a specially-crafted UPnP request to an affected device, resulting in remote code execution as the root user on the underlying operating system.\n\n\"Cisco has not released and will not release software updates to address the vulnerability,\" the company [noted](<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-sb-rv-overflow-htpymMB5>) in an advisory published Wednesday. \"The Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers have [entered the end-of-life process](<https://www.cisco.com/c/en/us/products/collateral/routers/small-business-rv-series-routers/eos-eol-notice-c51-742771.pdf>). Customers are encouraged to migrate to the Cisco Small Business RV132W, RV160, or RV160W Routers.\"\n\nThe issue impacts the following products \u2014\n\n * RV110W Wireless-N VPN Firewalls\n * RV130 VPN Routers\n * RV130W Wireless-N Multifunction VPN Routers\n * RV215W Wireless-N VPN Routers\n\nIn the absence of a patch, Cisco recommends customers to disable UPnP on the LAN interface. Quentin Kaiser of IoT Inspector Research Lab has been credited with reporting the vulnerability.\n\n\"All too often, after a system or service is replaced, the legacy system or service is left running 'just in case' it is needed again. The problem lies in the fact that \u2014 like in the case of this vulnerability in the Universal Plug-and-Play service \u2014 the legacy system or service is usually not kept up to date with security updates or configurations,\" said Dean Ferrando, systems engineer manager (EMEA) at Tripwire.\n\n\"This makes it an excellent target for bad actors, which is why organizations that are still using these old VPN routers should immediately take actions to update their devices. This should be part of an overall effort to harden systems across the entire attack surface, which helps to safeguard the integrity of digital assets and protect against vulnerabilities and common security threats which may be leveraged as entry points,\" Ferrando added.\n\nCVE-2021-34730 marks the second time the company has followed the approach of not releasing fixes for end-of-life routers since the start of the year. Earlier this April, Cisco urged users to upgrade their routers as a countermeasure to resolve a similar remote code execution bug ([CVE-2021-1459](<https://thehackernews.com/2021/04/cisco-will-not-patch-critical-rce-flaw.html>)) affecting RV110W VPN firewall and Small Business RV130, RV130W, and RV215W routers.\n\nIn addition, Cisco has also issued an alert for a [critical BadAlloc flaw](<https://thehackernews.com/2021/08/badalloc-flaw-affects-blackberry-qnx.html>) impacting BlackBerry QNX Real-Time Operating System (RTOS) that came to light earlier this week, [stating](<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL>) that the company is \"investigating its product line to determine which products and services may be affected by this vulnerability.\"\n\n \n\n\nFound this article interesting? Follow THN on [Facebook](<https://www.facebook.com/thehackernews>), [Twitter _\uf099_](<https://twitter.com/thehackersnews>) and [LinkedIn](<https://www.linkedin.com/company/thehackernews/>) to read more exclusive content we post.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-08-20T06:47:00", "type": "thn", "title": "Critical Flaw Found in Older Cisco Small Business Routers Won't Be Fixed", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-1459", "CVE-2021-34730"], "modified": "2021-08-20T10:10:52", "id": "THN:0B1D114F0E9F363E39DF54A7DB4324F9", "href": "https://thehackernews.com/2021/08/critical-flaw-found-in-older-cisco.html", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-09T12:38:22", "description": "[](<https://thehackernews.com/images/-0N_wxN59zE4/YHAXBYizABI/AAAAAAAACOQ/7fs1dXgboqQkpVRvRqgHZwLTbBVCEwMywCLcBGAsYHQ/s0/cisco.jpg>)\n\nNetworking equipment major Cisco Systems has said it does not plan to fix a critical security vulnerability affecting some of its Small Business routers, instead urging users to replace the devices.\n\nThe bug, tracked as CVE-2021-1459, is rated with a CVSS score of 9.8 out of 10, and affects RV110W VPN firewall and Small Business RV130, RV130W, and RV215W routers, allowing an unauthenticated, remote attacker to execute arbitrary code on an affected appliance.\n\nThe flaw, which stems from improper validation of user-supplied input in the web-based management interface, could be exploited by a malicious actor to send specially-crafted HTTP requests to the targeted device and achieve remote code execution.\n\n\"A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the affected device,\" Cisco [said](<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-q3rxHnvm>) in its advisory.\n\n[](<https://thehackernews.com/images/-58a_lpLOHx8/YHAZA2VHSdI/AAAAAAAACOc/oBaehG8rSQM7krcbLlP_n-18TvJLMxmawCLcBGAsYHQ/s0/cisco.jpg>)\n\nSecurity researcher Treck Zhou has been credited with reporting the vulnerability. Although the company noted there's been no evidence of active exploitation attempts in the wild, it doesn't intend to release a patch or make any workarounds available, citing that the products have [reached end-of-life](<https://www.cisco.com/c/en/us/products/collateral/routers/small-business-rv-series-routers/eos-eol-notice-c51-742771.pdf>).\n\n\"The Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers have entered the end-of-life process,\" the firm said. \"Customers are encouraged to migrate to the Cisco Small Business RV132W, RV160, or RV160W Routers.\"\n\nSeparately, Cisco has also [released software updates](<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy>) to address multiple vulnerabilities in Cisco SD-WAN vManage Software (CVE-2021-1137, CVE-2021-1479, and CVE-2021-1480) that could permit an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. \n\nA consequence of a buffer overflow condition, CVE-2021-1479 is rated 9.8 in severity, and a successful exploitation of which \"could allow the attacker to execute arbitrary code on the underlying operating system with root privileges.\"\n\n \n\n\nFound this article interesting? Follow THN on [Facebook](<https://www.facebook.com/thehackernews>), [Twitter _\uf099_](<https://twitter.com/thehackersnews>) and [LinkedIn](<https://www.linkedin.com/company/thehackernews/>) to read more exclusive content we post.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-04-09T09:22:00", "type": "thn", "title": "Cisco Will Not Patch Critical RCE Flaw Affecting End-of-Life Business Routers", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-1137", "CVE-2021-1459", "CVE-2021-1479", "CVE-2021-1480"], "modified": "2021-04-09T11:56:15", "id": "THN:F2A37F040B6AE81E1646EC5E0EE9EEA2", "href": "https://thehackernews.com/2021/04/cisco-will-not-patch-critical-rce-flaw.html", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "avleonov": [{"lastseen": "2021-11-11T02:42:15", "description": "Hello everyone! This is a new episode with my comments on the latest Information Security news.\n\n## Exchange ProxyShell\n\nI want to start with something about [attacks on Exchange](<https://thehackernews.com/2021/08/microsoft-exchange-under-attack-with.html>). ProxyShell is in the news, the LockFile ransomware compromised more than 2000 servers. On the other hand, there is basically nothing to say here.\n\nProxyShell is the name for 3 vulnerabilities. The bulletins for Remote Code Execution [CVE-2021-34473](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473>) and Server Elevation of Privilege [CVE-2021-34523](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523>) were released on July 13, but were fixed by April Patch Tuesday patches. Yes, it happens sometimes. The bulletin for Security Feature Bypass [CVE-2021-31207](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207>) was released on May 11. Users had 4 months to install the updates. Interestingly, 2 out of 3 vulnerabilities have the property "Less likely to be exploited". As you can see, it's pretty useless.\n\nIn addition to these spring vulnerabilities, there was also a set of July vulnerabilities (CVE-2021-31196, CVE-2021-31206, CVE-2021-33768, CVE-2021-34470). It is not yet clear if they will be used in real life attacks. Maybe yes, maybe no. But you need to install patches anyway.\n\nOne thing is clear, Exchange is a great target. It is used almost everywhere. It is a Windows host that is reachable at the perimeter of the network. It's scary to patch it. When the email service stops working, it becomes very noticeable. And keeping Exchange without updates is even worse. Therefore, the only option is to change the infrastructure so that testing and installing the updates should take a minimum of time. The patch released on Tuesday should be ideally installed on Wednesday. Everything else is dangerous. I'm not even talking about the pathologies when the organization continues to use Exchange 2010, for which there are no more updates.\n\n## Zoom RCE\n\nHave you already seen [a nice analysis of a Zoom Remote Code Execution](<https://sector7.computest.nl/post/2021-08-zoom/>), that does not require any user interaction? About two minutes of magic with call/message notifications and a calculator window appears on the target host. Very cool and effective.\n\nAnd here it should be noted that Zoom does not force updates. To update you need to go to Settings and click the "Check for Updates" button. I had version 2.7.4 and Zoom was not showing any notifications. After clicking on "Check for Updates", Zoom has updated to 2.7.6. Forced updates are not configurable in any way via the GUI, but in a corporate environment it seems like it can be enabled [using group policies](<https://support.zoom.us/hc/en-us/articles/360039100051-Group-Policy-Options-for-the-Windows-desktop-client-and-Zoom-Rooms>): EnableClientAutoUpdate, EnableSilentAutoUpdate, AlwaysCheckLatestVersion.\n\n## Citrix Canceled PT Acknowledgments\n\nCool story. [Citrix quietly removed Positive Technologies employees](<https://twitter.com/ptswarm/status/1429797658416328708>) Klyuchnikov and Medov from the acknowledgment sections for [CVE-2019-19781](<https://support.citrix.com/article/CTX267027>) and [CVE-2020-8209](<https://support.citrix.com/article/CTX277457>) vulnerabilities. There was a mention in March, but not in August. Citrix canceled their "thanks", so to speak. And it is clear why - the US sanctions against Positive Technologies. And when Citrix was pointed out and shamed on Twitter, they returned everything back. Also quietly. Well, such cuties, huh? ^_^\n\n## Cisco No Patch Router RCEs\n\nNot news, but an interesting feature of the brave new world. How it used to be: you buy hardware and use it until it breaks. Now any hardware requires constant updating for safe operation. And after a certain moment the vendor shrugs his shoulders and says "sorry, End Of Life". For example, this is how [Cisco responded to the RCE vulnerability CVE-2021-34730](<https://thehackernews.com/2021/08/critical-flaw-found-in-older-cisco.html>) (CVSS score: 9.8) in the UPnP service for SMB routers RV110W, RV130, RV130W and RV215W. [They write that](<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-sb-rv-overflow-htpymMB5>) either disable UPnP completely, or throw out the router and buy a new one. On the one hand, UPnP is certainly not secure and you don't need to use it. But come on, this is a legitimate feature, and Cisco doesn't want to fix vulnerabilities in it for not-so-old hardware released in 2011-2013. Moreover, this is not the first RCE in these routers that they do not want to fix, [in April there was CVE-2021-1459 in the admin web interface](<https://thehackernews.com/2021/04/cisco-will-not-patch-critical-rce-flaw.html?m=1>). In terms of functionality, the devices are quite adequate, given that they now cost less than $ 100.\n\n"[The RV130W Wireless-N Router](<https://www.cisco.com/c/en/us/products/routers/rv130w-wireless-n-multifunction-vpn-router/index.html>) offers investment protection as your small business needs evolve. This multifunctional networking device features:\n\n * Gigabit Ethernet connections, including a four-port managed switch\n * USB 3G/4G failover support\n * Built-in, high-speed wireless-N access point\n * IP Security (IPsec) VPN for flexible remote access\n * Support for separate virtual networks and wireless guest access".\n\nAnd formally they are right. But I would like the support period to be longer, and critical vulnerabilities were fixed even after this period, and there was an opportunity to install alternative firmware, and there was mandatory marking when the device "turns into a pumpkin." There is a lot to wish for. ", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-08-31T23:16:51", "type": "avleonov", "title": "Security News: Exchange ProxyShell, Zoom RCE, Citrix Canceled PT Acknowledgments, Cisco No Patch Router RCEs", "bulletinFamily": "blog", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19781", "CVE-2020-8209", "CVE-2021-1459", "CVE-2021-31196", "CVE-2021-31206", "CVE-2021-31207", "CVE-2021-33768", "CVE-2021-34470", "CVE-2021-34473", "CVE-2021-34523", "CVE-2021-34730"], "modified": "2021-08-31T23:16:51", "id": "AVLEONOV:B0F649A99B171AC3032AF71B1DCCFE34", "href": "https://avleonov.com/2021/09/01/security-news-exchange-proxyshell-zoom-rce-citrix-canceled-pt-acknowledgments-cisco-no-patch-router-rces/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}