Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-1520


A vulnerability in the internal message processing of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, local attacker to run arbitrary commands with root privileges on the underlying operating system (OS). This vulnerability exists because an internal messaging service does not properly sanitize input. An attacker could exploit this vulnerability by first authenticating to the device and then sending a crafted request to the internal service. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying OS. To exploit this vulnerability, the attacker must have valid Administrator credentials for the device.


Published

2021-05-06T13:15:11.027

Last Modified

2024-11-21T05:44:32.147

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.7 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-123

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco rv340_firmware < 1.0.03.21 Yes
Hardware cisco rv340 - No
Operating System cisco rv340w_firmware < 1.0.03.21 Yes
Hardware cisco rv340w - No
Operating System cisco rv345_firmware < 1.0.03.21 Yes
Hardware cisco rv345 - No
Operating System cisco rv345p_firmware < 1.0.03.21 Yes
Hardware cisco rv345p - No

References