Lucene search

K
cvelistCiscoCVELIST:CVE-2023-20026
HistoryJan 19, 2023 - 1:33 a.m.

CVE-2023-20026

2023-01-1901:33:26
cisco
www.cve.org
2
cisco small business routers
remote attack
arbitrary commands
administrator credentials

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

34.4%

A vulnerability in the web-based management interface of Cisco Small Business Routers RV042 Series could allow an authenticated, remote attacker to inject arbitrary commands on an affected device.

This vulnerability is due to improper validation of user input fields within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Small Business RV Series Router Firmware",
    "versions": [
      {
        "version": "1.0.00.29",
        "status": "affected"
      },
      {
        "version": "1.0.00.33",
        "status": "affected"
      },
      {
        "version": "1.0.01.16",
        "status": "affected"
      },
      {
        "version": "1.0.01.17",
        "status": "affected"
      },
      {
        "version": "1.0.01.18",
        "status": "affected"
      },
      {
        "version": "1.0.01.20",
        "status": "affected"
      },
      {
        "version": "1.0.02.16",
        "status": "affected"
      },
      {
        "version": "1.0.03.15",
        "status": "affected"
      },
      {
        "version": "1.0.03.16",
        "status": "affected"
      },
      {
        "version": "1.0.03.17",
        "status": "affected"
      },
      {
        "version": "1.0.03.18",
        "status": "affected"
      },
      {
        "version": "1.0.03.19",
        "status": "affected"
      },
      {
        "version": "1.0.03.20",
        "status": "affected"
      },
      {
        "version": "1.0.03.21",
        "status": "affected"
      },
      {
        "version": "1.0.03.22",
        "status": "affected"
      },
      {
        "version": "1.0.03.24",
        "status": "affected"
      },
      {
        "version": "1.0.03.26",
        "status": "affected"
      },
      {
        "version": "1.0.03.27",
        "status": "affected"
      },
      {
        "version": "1.0.03.28",
        "status": "affected"
      },
      {
        "version": "1.0.03.29",
        "status": "affected"
      },
      {
        "version": "2.0.0.19-tm",
        "status": "affected"
      },
      {
        "version": "2.0.2.01-tm",
        "status": "affected"
      },
      {
        "version": "1.3.12.19-tm",
        "status": "affected"
      },
      {
        "version": "1.3.12.6-tm",
        "status": "affected"
      },
      {
        "version": "1.3.13.02-tm",
        "status": "affected"
      },
      {
        "version": "1.3.9.8-tm",
        "status": "affected"
      },
      {
        "version": "4.0.0.7",
        "status": "affected"
      },
      {
        "version": "4.0.2.08-tm",
        "status": "affected"
      },
      {
        "version": "4.0.3.03-tm",
        "status": "affected"
      },
      {
        "version": "4.0.4.02-tm",
        "status": "affected"
      },
      {
        "version": "4.2.1.02",
        "status": "affected"
      },
      {
        "version": "4.2.2.08",
        "status": "affected"
      },
      {
        "version": "4.2.3.03",
        "status": "affected"
      },
      {
        "version": "4.2.3.06",
        "status": "affected"
      },
      {
        "version": "4.2.3.07",
        "status": "affected"
      },
      {
        "version": "4.2.3.08",
        "status": "affected"
      },
      {
        "version": "4.2.3.09",
        "status": "affected"
      },
      {
        "version": "4.2.3.10",
        "status": "affected"
      },
      {
        "version": "4.2.3.14",
        "status": "affected"
      },
      {
        "version": "3.0.0.1-tm",
        "status": "affected"
      },
      {
        "version": "3.0.0.19-tm",
        "status": "affected"
      },
      {
        "version": "3.0.2.01-tm",
        "status": "affected"
      },
      {
        "version": "4.1.1.01",
        "status": "affected"
      },
      {
        "version": "4.1.0.02-tm",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

34.4%

Related for CVELIST:CVE-2023-20026