10
CVE-2022-20827
- EPSS 5.84%
- Published 10.08.2022 09:15:08
- Last modified 21.11.2024 06:43:38
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Rv160 Firmware Version < 1.0.01.05
Cisco ≫ Rv160w Firmware Version < 1.0.01.05
Cisco ≫ Rv260 Firmware Version < 1.0.01.05
Cisco ≫ Rv260p Firmware Version < 1.0.01.05
Cisco ≫ Rv260w Firmware Version < 1.0.01.05
Cisco ≫ Rv340 Firmware Version < 1.0.03.26
Cisco ≫ Rv340w Firmware Version < 1.0.03.26
Cisco ≫ Rv345 Firmware Version < 1.0.03.26
Cisco ≫ Rv345p Firmware Version < 1.0.03.26
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 5.84% | 0.902 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 10 | 3.9 | 6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
psirt@cisco.com | 9 | 2.2 | 6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.