cisco rv340_firmware 任意地址可写任意内容条件

CVE编号

CVE-2021-1520

利用情况

暂无

补丁情况

N/A

披露时间

2021-05-06
漏洞描述
A vulnerability in the internal message processing of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, local attacker to run arbitrary commands with root privileges on the underlying operating system (OS). This vulnerability exists because an internal messaging service does not properly sanitize input. An attacker could exploit this vulnerability by first authenticating to the device and then sending a crafted request to the internal service. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying OS. To exploit this vulnerability, the attacker must have valid Administrator credentials for the device.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 cisco rv340w_firmware * Up to
(excluding)
1.0.03.21
运行在以下环境
系统 cisco rv340_firmware * Up to
(excluding)
1.0.03.21
运行在以下环境
系统 cisco rv345p_firmware * Up to
(excluding)
1.0.03.21
运行在以下环境
系统 cisco rv345_firmware * Up to
(excluding)
1.0.03.21
运行在以下环境
硬件 cisco rv340 - -
运行在以下环境
硬件 cisco rv340w - -
运行在以下环境
硬件 cisco rv345 - -
运行在以下环境
硬件 cisco rv345p - -
CVSS3评分
6.7
  • 攻击路径
    本地
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-123 任意地址可写任意内容条件
阿里云安全产品覆盖情况