ID CVE-2020-3293 Type cve Reporter cve@mitre.org Modified 2020-06-23T18:46:00
Description
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
{"id": "CVE-2020-3293", "bulletinFamily": "NVD", "title": "CVE-2020-3293", "description": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.", "published": "2020-06-18T03:15:00", "modified": "2020-06-23T18:46:00", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-3293", "reporter": "cve@mitre.org", "references": ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz"], "cvelist": ["CVE-2020-3293"], "type": "cve", "lastseen": "2020-12-09T22:03:14", "edition": 7, "viewCount": 14, "enchantments": {"dependencies": {"references": [{"type": "cisco", "idList": ["CISCO-SA-RV-ROUTERS-STACK-VUXHMNNZ"]}, {"type": "nessus", "idList": ["CISCO-SA-RV-ROUTERS-STACK-VUXHMNNZ.NASL"]}], "modified": "2020-12-09T22:03:14", "rev": 2}, "score": {"value": 6.6, "vector": "NONE", "modified": "2020-12-09T22:03:14", "rev": 2}, "vulnersScore": 6.6}, "cpe": ["cpe:/o:cisco:rv042_firmware:4.2.3.10", "cpe:/o:cisco:rv016_firmware:4.2.3.10", "cpe:/o:cisco:rv082_firmware:4.2.3.10", "cpe:/o:cisco:rv320_firmware:1.5.1.05", "cpe:/o:cisco:rv325_firmware:1.5.1.05", "cpe:/o:cisco:rv042g_firmware:4.2.3.10"], "affectedSoftware": [{"cpeName": "cisco:rv082_firmware", "name": "cisco rv082 firmware", "operator": "le", "version": "4.2.3.10"}, {"cpeName": "cisco:rv016_firmware", "name": "cisco rv016 firmware", "operator": "le", "version": "4.2.3.10"}, {"cpeName": "cisco:rv042g_firmware", "name": "cisco rv042g firmware", "operator": "le", "version": "4.2.3.10"}, {"cpeName": "cisco:rv320_firmware", "name": "cisco rv320 firmware", "operator": "le", "version": "1.5.1.05"}, {"cpeName": "cisco:rv325_firmware", "name": "cisco rv325 firmware", "operator": "le", "version": "1.5.1.05"}, {"cpeName": "cisco:rv042_firmware", "name": "cisco rv042 firmware", "operator": "le", "version": "4.2.3.10"}], "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 5.9}, "cpe23": ["cpe:2.3:o:cisco:rv042g_firmware:4.2.3.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv082_firmware:4.2.3.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv016_firmware:4.2.3.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:4.2.3.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:1.5.1.05:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:1.5.1.05:*:*:*:*:*:*:*"], "cwe": ["CWE-119"], "scheme": null, "affectedConfiguration": [{"cpeName": "cisco:rv042", "name": "cisco rv042", "operator": "eq", "version": "-"}, {"cpeName": "cisco:rv320", "name": "cisco rv320", "operator": "eq", "version": "-"}, {"cpeName": "cisco:rv325", "name": "cisco rv325", "operator": "eq", "version": "-"}, {"cpeName": "cisco:rv082", "name": "cisco rv082", "operator": "eq", "version": "-"}, {"cpeName": "cisco:rv016", "name": "cisco rv016", "operator": "eq", "version": "-"}, {"cpeName": "cisco:rv042g", "name": "cisco rv042g", "operator": "eq", "version": "-"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:o:cisco:rv016_firmware:4.2.3.10:*:*:*:*:*:*:*", "versionEndIncluding": "4.2.3.10", "vulnerable": true}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:cisco:rv320_firmware:1.5.1.05:*:*:*:*:*:*:*", "versionEndIncluding": "1.5.1.05", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:cisco:rv082_firmware:4.2.3.10:*:*:*:*:*:*:*", "versionEndIncluding": "4.2.3.10", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:cisco:rv042g_firmware:4.2.3.10:*:*:*:*:*:*:*", "versionEndIncluding": "4.2.3.10", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:cisco:rv042_firmware:4.2.3.10:*:*:*:*:*:*:*", "versionEndIncluding": "4.2.3.10", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:cisco:rv325_firmware:1.5.1.05:*:*:*:*:*:*:*", "versionEndIncluding": "1.5.1.05", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}]}}
{"cisco": [{"lastseen": "2020-12-24T11:40:30", "bulletinFamily": "software", "cvelist": ["CVE-2020-3286", "CVE-2020-3287", "CVE-2020-3288", "CVE-2020-3289", "CVE-2020-3290", "CVE-2020-3291", "CVE-2020-3292", "CVE-2020-3293", "CVE-2020-3294", "CVE-2020-3295", "CVE-2020-3296"], "description": "Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device.\n\nThe vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.\n\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\n\nThis advisory is available at the following link:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz [\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz\"]", "modified": "2020-06-17T16:00:00", "published": "2020-06-17T16:00:00", "id": "CISCO-SA-RV-ROUTERS-STACK-VUXHMNNZ", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz", "type": "cisco", "title": "Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities", "cvss": {"score": 7.2, "vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}}], "nessus": [{"lastseen": "2020-09-18T13:21:04", "description": "According to its self-reported version, Cisco Small Business RV Series Router Firmware is affected by multiple \n remote code execution vulnerabilities in its web-based management interface due to insufficient boundary restrictions\n on user-supplied input. An authenticated, remote attacker can exploit these to execute arbitrary commands on an \n affected host. \n \n Please see the included Cisco BIDs and Cisco Security Advisory for more information.\n \n Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported \n version", "edition": 4, "cvss3": {"score": 7.2, "vector": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-06-26T00:00:00", "title": "Cisco Small Business RV Series Routers Multiple Vulnerabilities (cisco-sa-rv-routers-stack-vUxHmnNz)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-3296", "CVE-2020-3291", "CVE-2020-3292", "CVE-2020-3293", "CVE-2020-3289", "CVE-2020-3295", "CVE-2020-3286", "CVE-2020-3287", "CVE-2020-3290", "CVE-2020-3294", "CVE-2020-3288"], "modified": "2020-06-26T00:00:00", "cpe": ["cpe:/o:cisco:small_business_rv_series_router_firmware"], "id": "CISCO-SA-RV-ROUTERS-STACK-VUXHMNNZ.NASL", "href": "https://www.tenable.com/plugins/nessus/137852", "sourceData": "#TRUSTED 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\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(137852);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/17\");\n\n script_cve_id(\n \"CVE-2020-3286\",\n \"CVE-2020-3287\",\n \"CVE-2020-3288\",\n \"CVE-2020-3289\",\n \"CVE-2020-3290\",\n \"CVE-2020-3291\",\n \"CVE-2020-3292\",\n \"CVE-2020-3293\",\n \"CVE-2020-3294\",\n \"CVE-2020-3295\",\n \"CVE-2020-3296\"\n );\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCvt26705\");\n script_xref(name:\"CISCO-BUG-ID\", value:\"CSCvt29414\");\n script_xref(name:\"CISCO-SA\", value:\"cisco-sa-rv-routers-stack-vUxHmnNz\");\n script_xref(name:\"IAVA\", value:\"2020-A-0274\");\n\n script_name(english:\"Cisco Small Business RV Series Routers Multiple Vulnerabilities (cisco-sa-rv-routers-stack-vUxHmnNz)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote device is missing a vendor-supplied security patch\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version, Cisco Small Business RV Series Router Firmware is affected by multiple \n remote code execution vulnerabilities in its web-based management interface due to insufficient boundary restrictions\n on user-supplied input. An authenticated, remote attacker can exploit these to execute arbitrary commands on an \n affected host. \n \n Please see the included Cisco BIDs and Cisco Security Advisory for more information.\n \n Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported \n version\");\n # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6d21c4b0\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvt26705\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvt29414\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvt26705, CSCvt29414\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-3293\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/06/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/26\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:cisco:small_business_rv_series_router_firmware\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CISCO\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"cisco_small_business_detect.nasl\", \"cisco_rv_webui_detect.nbin\");\n script_require_keys(\"Cisco/Small_Business_Router/Version\", \"Cisco/Small_Business_Router/Device\");\n\n exit(0);\n}\n\ninclude('ccf.inc');\ninclude('cisco_workarounds.inc');\n\nproduct_info = cisco::get_product_info(name:'Cisco Small Business Series Router Firmware');\n\nvuln_ranges = [\n {'min_ver':'1.0.0.0', 'fix_ver':'1.5.1.11'},\n {'min_ver':'4.0.0.0', 'fix_ver':'4.2.3.14'},\n];\n\nreporting = make_array(\n 'port' , 0,\n 'severity' , SECURITY_HOLE,\n 'version' , product_info['version'],\n 'bug_id' , 'CSCvt26705, CSCvt29414'\n);\n\ncisco::check_and_report(\n product_info:product_info,\n reporting:reporting,\n vuln_ranges:vuln_ranges,\n models:make_list('RV016', 'RV042', 'RV042G', 'RV082', 'RV320', 'RV325')\n);\n", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}]}