CVE-2023-20045

CVSS V2 None CVSS V3 None
Description
A vulnerability in the web-based management interface of Cisco Small Business RV160 and RV260 Series VPN Routers could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands using root-level privileges on the affected device. To exploit this vulnerability, the attacker must have valid Administrator-level credentials on the affected device.
Overview
  • CVE ID
  • CVE-2023-20045
  • Assigner
  • ykramarz@cisco.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-20T07:15:16
  • Last Modified Date
  • 2023-01-30T19:00:50
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:cisco:rv160_vpn_router_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.01.04
cpe:2.3:h:cisco:rv160_vpn_router:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:cisco:rv160w_wireless-ac_vpn_router_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.01.04
cpe:2.3:h:cisco:rv160w_wireless-ac_vpn_router:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:cisco:rv260_vpn_router_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.01.04
cpe:2.3:h:cisco:rv260_vpn_router:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:cisco:rv260p_vpn_router_with_poe_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.01.04
cpe:2.3:h:cisco:rv260p_vpn_router_with_poe:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:cisco:rv260p_vpn_router_with_poe_firmware:*:*:*:*:*:*:*:* 1 OR 1.0.01.04
cpe:2.3:h:cisco:rv260p_vpn_router_with_poe:-:*:*:*:*:*:*:* 0 OR
History
Created Old Value New Value Data Type Notes
2023-01-20 08:14:22 Added to TrackCVE
2023-01-20 15:14:59 2023-01-20T13:54:58 CVE Modified Date updated
2023-01-20 15:14:59 Received Awaiting Analysis Vulnerability Status updated
2023-01-30 15:14:15 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-30 21:13:45 2023-01-30T19:00:50 CVE Modified Date updated
2023-01-30 21:13:45 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-30 21:13:46 Weakness Enumeration new
2023-01-30 21:13:49 CPE Information updated