The networking equipment maker Cisco rolled out patches for multiple critical vulnerabilities in Cisco RV series routers. Cisco marked 15 vulnerabilities in its advisory, of which three carried the highest CVSS score of 10.0. Advisory also says that the successful exploitation of the vulnerabilities could lead to attacks like arbitrary code execution, privilege escalation, bypass authentication and authorization protections, and Denial of Service (DoS). It is very important to know more about the vulnerabilities for a user who uses Cisco’s RV series of routers in their network. Let’s see the list of vulnerabilities and their impact, along with how to fix those critical vulnerabilities in the affected Cisco RV series of routers.
Here are the list of routers vulnerable to flaws.
RV160 and RV260 Series Routers v1.0.01.05 and earlier are affected by these vulnerabilities. RV340 and RV345 Series Routers c1.0.03.24 are affected by these vulnerabilities.
Router Modules | Vulnerabilities |
RV160 VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 |
RV160W Wireless-AC VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 |
RV260 VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 |
RV260P VPN Routers with PoE | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 |
RV260W Wireless-AC VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 |
RV340 Dual WAN Gigabit VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 CVE-2022-20699 CVE-2022-20707 CVE-2022-20708 CVE-2022-20709 CVE-2022-20711 CVE-2022-20749 |
RV340W Dual WAN Gigabit Wireless-AC VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 CVE-2022-20699 CVE-2022-20707 CVE-2022-20708 CVE-2022-20709 CVE-2022-20711 CVE-2022-20749 |
RV345 Dual WAN Gigabit VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 CVE-2022-20699 CVE-2022-20707 CVE-2022-20708 CVE-2022-20709 CVE-2022-20711 CVE-2022-20749 |
RV345P Dual WAN Gigabit POE VPN Routers | CVE-2022-20700 CVE-2022-20701 CVE-2022-20702 CVE-2022-20703 CVE-2022-20704 CVE-2022-20705 CVE-2022-20706 CVE-2022-20710 CVE-2022-20712 CVE-2022-20699 CVE-2022-20707 CVE-2022-20708 CVE-2022-20709 CVE-2022-20711 CVE-2022-20749 |
Here is the list of vulnerabilities published in the security advisory.
CVE-2022-20699: This vulnerability allows remote attackers to perform an unauthenticated arbitrary code execution affected devices. The flaw is due to improper boundary checks when processing specific HTTP requests, so it can be exploited by crafting a malicious HTTP request. Cisco routers RV340, RV340W, RV345, and RV345P are affected by this vulnerability.
CVE-2022-20700, CVE-2022-20701, CVE-2022-20702: This flaw allows remote attackers to elevate privileges to root. This vulnerability is due to insufficient authorization enforcement mechanisms. An attacker could exploit this vulnerability by submitting specific commands. All the
CVE-2022-20703: This flaw allows attackers to install and load malicious software images on the affected devices. This is due to improper verification of software images.
CVE-2022-20704: Due to improper validation of the SSL server certificate, attackers can view and modify the information shared between affected devices. This vulnerability gives an opportunity for attackers to carry out the man-in-the-middle attack and intercept the traffic.
CVE-2022-20705: Vulnerability in the session management of the web UI permits an unauthenticated, remote attacker to access web UI by bypassing authentication protections.
CVE-2022-20706: The vulnerability is due to insufficient validation of user-supplied input in the router operating system’s Open Plug and Play (PnP) module. This allows a remote attacker to inject and execute arbitrary commands on the affected system. Attackers can exploit the flaws by sending malicious input to an affected device.
CVE-2022-20707, CVE-2022-20708, CVE-2022-20749: The vulnerability is due to insufficient validation of user-supplied input in the web-based management interface of the affected routers. This allows a remote attacker to inject and execute arbitrary commands on the affected system. Attackers can exploit the flaws by sending malicious input to an affected device. Cisco routers RV340, RV340W, RV345, and RV345P are affected by this vulnerability.
CVE-2022-20709: This vulnerability allows an attacker to upload arbitrary files due to insufficient authorization enforcement in the web-based management interface. The attacker can exploit this vulnerability by sending a crafted HTTP request. Cisco routers RV340, RV340W, RV345, and RV345P are affected by this vulnerability.
CVE-2022-20710: Erroneously handled exceptions during failed login attempts to prevent legitimate logins. This causes a denial of service in login functionality in the web-based management interface. This vulnerability can be exploited by submitting a crafted HTTP packet.
CVE-2022-20711: insufficient input validation of the web UI components allows attackers to overwrite certain files. Attackers can exploit the flaws by sending crafted HTTP requests to the vulnerable device. Cisco routers RV340, RV340W, RV345, and RV345P are affected by this vulnerability.
CVE-2022-20712: This flaw allows remote attackers to execute arbitrary code. It happens when there are insufficient boundary checks in processing specific HTTP requests. Attackers can exploit the flaws by sending crafted HTTP requests to the vulnerable device.
Sl. No. | CVE ID: | CVSS Base Score | CVSS Vector: |
1 | CVE-2022-20699 | 10.0 Critical | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
2 | CVE-2022-20700 | 10.0 Critical | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3 | CVE-2022-20701 | 9.0 Critical | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N |
4 | CVE-2022-20702 | 6.0 Medium | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N |
5 | CVE-2022-20703 | 9.3 Critical | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
6 | CVE-2022-20704 | 4.8 Low | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
7 | CVE-2022-20705 | 5.3 Medium | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
8 | CVE-2022-20706 | 8.3 High | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H |
9 | CVE-2022-20708 | 10.0 Critical | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
10 | CVE-2022-20707 | 7.3 Medium | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
11 | CVE-2022-20749 | 7.3 Medium | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
12 | CVE-2022-20709 | 5.3 Medium | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
13 | CVE-2022-20710 | 5.3 Medium | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
14 | CVE-2022-20711 | 8.2 High | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N |
15 | CVE-2022-20712 | 7.3 Medium | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
Vulnerabilities in RV160 and RV260 series routers are fixed in release no. TBD (Feb 2022) and RV340 and RV345 series routers are fixed in 1.0.03.26.
Since there is no workaround to fix these vulnerabilities, it is required to upgrade the firmware version of the router. Please visit the security advisories or contact Cisco TAC service for more details.
We hope this post would help you know about the Multiple Critical Vulnerabilities in Cisco RV Series Routers. Thanks for reading this threat post. Please share this post and help to secure the digital world. Visit our social media page in Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
You may also like these articles:
How To Fix CVE-2022-20798- An Authentication Bypass Vulnerability In Cisco ESA And Cisco SMA
How To Fix CVE-2022-20650- The New RCE Vulnerability In Cisco Switches?
"How to Fix Cve-2022-20842, a Remote Code Execution Vulnerability in Cisco RV Series Routers"
How To Fix CVE-2022-20695- A Critical Authentication Bypass Vulnerability In Cisco WLC
How To Fix CVE-2022-20857- An Arbitrary Command Execution Vulnerability In Cisco Nexus Dashboard
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.