Vulnerabilites related to cisco - rv345_dual_wan_gigabit_vpn_router_firmware
cve-2020-3358
Vulnerability from cvelistv5
Published
2020-07-16 17:21
Modified
2024-11-15 16:53
Summary
A vulnerability in the Secure Sockets Layer (SSL) VPN feature for Cisco Small Business RV VPN Routers could allow an unauthenticated, remote attacker to cause the device to unexpectedly restart, causing a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to the targeted device. A successful exploit could allow the attacker to cause a reload, resulting in a DoS condition.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:30:58.220Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20200715 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-dos-ZN5GvNH7"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-3358",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:21:02.200794Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T16:53:59.870Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Small Business RV Series Router Firmware",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2020-07-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Secure Sockets Layer (SSL) VPN feature for Cisco Small Business RV VPN Routers could allow an unauthenticated, remote attacker to cause the device to unexpectedly restart, causing a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to the targeted device. A successful exploit could allow the attacker to cause a reload, resulting in a DoS condition."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-16T17:21:28",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20200715 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-dos-ZN5GvNH7"
        }
      ],
      "source": {
        "advisory": "cisco-sa-sb-dos-ZN5GvNH7",
        "defect": [
          [
            "CSCvu36544"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2020-07-15T16:00:00",
          "ID": "CVE-2020-3358",
          "STATE": "PUBLIC",
          "TITLE": "Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Small Business RV Series Router Firmware",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Secure Sockets Layer (SSL) VPN feature for Cisco Small Business RV VPN Routers could allow an unauthenticated, remote attacker to cause the device to unexpectedly restart, causing a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to the targeted device. A successful exploit could allow the attacker to cause a reload, resulting in a DoS condition."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "8.6",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20200715 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-dos-ZN5GvNH7"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-sb-dos-ZN5GvNH7",
          "defect": [
            [
              "CSCvu36544"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2020-3358",
    "datePublished": "2020-07-16T17:21:28.529068Z",
    "dateReserved": "2019-12-12T00:00:00",
    "dateUpdated": "2024-11-15T16:53:59.870Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-20470
Vulnerability from cvelistv5
Published
2024-10-02 16:54
Modified
2024-10-02 19:18
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. In order to exploit this vulnerability, the attacker must have valid admin credentials. This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.
Impacted products
Vendor Product Version
Cisco Cisco Small Business RV Series Router Firmware Version: 1.0.01.17
Version: 1.0.03.17
Version: 1.0.01.16
Version: 1.0.01.18
Version: 1.0.00.29
Version: 1.0.03.16
Version: 1.0.03.15
Version: 1.0.02.16
Version: 1.0.01.20
Version: 1.0.00.33
Version: 1.0.03.18
Version: 1.0.03.19
Version: 1.0.03.20
Version: 1.0.03.21
Version: 1.0.03.22
Version: 1.0.03.24
Version: 1.0.03.26
Version: 1.0.03.27
Version: 1.0.03.28
Version: 1.0.03.29
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20470",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T18:58:00.677132Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T19:18:33.143Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Small Business RV Series Router Firmware",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "1.0.01.17"
            },
            {
              "status": "affected",
              "version": "1.0.03.17"
            },
            {
              "status": "affected",
              "version": "1.0.01.16"
            },
            {
              "status": "affected",
              "version": "1.0.01.18"
            },
            {
              "status": "affected",
              "version": "1.0.00.29"
            },
            {
              "status": "affected",
              "version": "1.0.03.16"
            },
            {
              "status": "affected",
              "version": "1.0.03.15"
            },
            {
              "status": "affected",
              "version": "1.0.02.16"
            },
            {
              "status": "affected",
              "version": "1.0.01.20"
            },
            {
              "status": "affected",
              "version": "1.0.00.33"
            },
            {
              "status": "affected",
              "version": "1.0.03.18"
            },
            {
              "status": "affected",
              "version": "1.0.03.19"
            },
            {
              "status": "affected",
              "version": "1.0.03.20"
            },
            {
              "status": "affected",
              "version": "1.0.03.21"
            },
            {
              "status": "affected",
              "version": "1.0.03.22"
            },
            {
              "status": "affected",
              "version": "1.0.03.24"
            },
            {
              "status": "affected",
              "version": "1.0.03.26"
            },
            {
              "status": "affected",
              "version": "1.0.03.27"
            },
            {
              "status": "affected",
              "version": "1.0.03.28"
            },
            {
              "status": "affected",
              "version": "1.0.03.29"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. In order to exploit this vulnerability, the attacker must have valid admin credentials.\r\n\r\nThis vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-146",
              "description": "Improper Neutralization of Expression/Command Delimiters",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T16:54:58.682Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-rv34x-privesc-rce-qE33TCms",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms"
        }
      ],
      "source": {
        "advisory": "cisco-sa-rv34x-privesc-rce-qE33TCms",
        "defects": [
          "CSCwk99655"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20470",
    "datePublished": "2024-10-02T16:54:58.682Z",
    "dateReserved": "2023-11-08T15:08:07.681Z",
    "dateUpdated": "2024-10-02T19:18:33.143Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-3357
Vulnerability from cvelistv5
Published
2020-07-16 17:21
Modified
2024-11-15 16:54
Severity ?
Summary
A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause the device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because HTTP requests are not properly validated. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device or cause the device to reload, resulting in a DoS condition.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:30:58.150Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20200715 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rce-dos-9ZAjkx4"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-3357",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:19:31.307662Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T16:54:14.193Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Small Business RV Series Router Firmware",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2020-07-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause the device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because HTTP requests are not properly validated. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device or cause the device to reload, resulting in a DoS condition."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-16T17:21:23",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20200715 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rce-dos-9ZAjkx4"
        }
      ],
      "source": {
        "advisory": "cisco-sa-sb-rce-dos-9ZAjkx4",
        "defect": [
          [
            "CSCvu36543"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2020-07-15T16:00:00",
          "ID": "CVE-2020-3357",
          "STATE": "PUBLIC",
          "TITLE": "Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Small Business RV Series Router Firmware",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause the device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because HTTP requests are not properly validated. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device or cause the device to reload, resulting in a DoS condition."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "9.8",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20200715 Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Remote Code Execution and Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rce-dos-9ZAjkx4"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-sb-rce-dos-9ZAjkx4",
          "defect": [
            [
              "CSCvu36543"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2020-3357",
    "datePublished": "2020-07-16T17:21:24.031974Z",
    "dateReserved": "2019-12-12T00:00:00",
    "dateUpdated": "2024-11-15T16:54:14.193Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-20393
Vulnerability from cvelistv5
Published
2024-10-02 16:53
Modified
2024-10-02 19:58
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device. This vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin.
Impacted products
Vendor Product Version
Cisco Cisco Small Business RV Series Router Firmware Version: 1.0.01.17
Version: 1.0.03.17
Version: 1.0.01.16
Version: 1.0.01.18
Version: 1.0.00.29
Version: 1.0.03.16
Version: 1.0.03.15
Version: 1.0.02.16
Version: 1.0.01.20
Version: 1.0.00.33
Version: 1.0.03.18
Version: 1.0.03.19
Version: 1.0.03.20
Version: 1.0.03.21
Version: 1.0.03.22
Version: 1.0.03.24
Version: 1.0.03.26
Version: 1.0.03.27
Version: 1.0.03.28
Version: 1.0.03.29
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "small_business_rv_series_router_firmware",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "1.0.01.17"
              },
              {
                "status": "affected",
                "version": "1.0.03.17"
              },
              {
                "status": "affected",
                "version": "1.0.01.16"
              },
              {
                "status": "affected",
                "version": "1.0.01.18"
              },
              {
                "status": "affected",
                "version": "1.0.00.29"
              },
              {
                "status": "affected",
                "version": "1.0.03.16"
              },
              {
                "status": "affected",
                "version": "1.0.03.15"
              },
              {
                "status": "affected",
                "version": "1.0.02.16"
              },
              {
                "status": "affected",
                "version": "1.0.01.20"
              },
              {
                "status": "affected",
                "version": "1.0.00.33"
              },
              {
                "status": "affected",
                "version": "1.0.03.18"
              },
              {
                "status": "affected",
                "version": "1.0.03.19"
              },
              {
                "status": "affected",
                "version": "1.0.03.20"
              },
              {
                "status": "affected",
                "version": "1.0.03.21"
              },
              {
                "status": "affected",
                "version": "1.0.03.22"
              },
              {
                "status": "affected",
                "version": "1.0.03.24"
              },
              {
                "status": "affected",
                "version": "1.0.03.26"
              },
              {
                "status": "affected",
                "version": "1.0.03.27"
              },
              {
                "status": "affected",
                "version": "1.0.03.28"
              },
              {
                "status": "affected",
                "version": "1.0.03.29"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20393",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T19:02:15.620891Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T19:58:58.443Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Small Business RV Series Router Firmware",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "1.0.01.17"
            },
            {
              "status": "affected",
              "version": "1.0.03.17"
            },
            {
              "status": "affected",
              "version": "1.0.01.16"
            },
            {
              "status": "affected",
              "version": "1.0.01.18"
            },
            {
              "status": "affected",
              "version": "1.0.00.29"
            },
            {
              "status": "affected",
              "version": "1.0.03.16"
            },
            {
              "status": "affected",
              "version": "1.0.03.15"
            },
            {
              "status": "affected",
              "version": "1.0.02.16"
            },
            {
              "status": "affected",
              "version": "1.0.01.20"
            },
            {
              "status": "affected",
              "version": "1.0.00.33"
            },
            {
              "status": "affected",
              "version": "1.0.03.18"
            },
            {
              "status": "affected",
              "version": "1.0.03.19"
            },
            {
              "status": "affected",
              "version": "1.0.03.20"
            },
            {
              "status": "affected",
              "version": "1.0.03.21"
            },
            {
              "status": "affected",
              "version": "1.0.03.22"
            },
            {
              "status": "affected",
              "version": "1.0.03.24"
            },
            {
              "status": "affected",
              "version": "1.0.03.26"
            },
            {
              "status": "affected",
              "version": "1.0.03.27"
            },
            {
              "status": "affected",
              "version": "1.0.03.28"
            },
            {
              "status": "affected",
              "version": "1.0.03.29"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device.\r\n\r\nThis vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "Improper Authorization",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T16:53:04.527Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-rv34x-privesc-rce-qE33TCms",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms"
        }
      ],
      "source": {
        "advisory": "cisco-sa-rv34x-privesc-rce-qE33TCms",
        "defects": [
          "CSCwm27935"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Privilege Escalation Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20393",
    "datePublished": "2024-10-02T16:53:04.527Z",
    "dateReserved": "2023-11-08T15:08:07.659Z",
    "dateUpdated": "2024-10-02T19:58:58.443Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2020-07-16 18:15
Modified
2024-11-21 05:30
Summary
A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause the device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because HTTP requests are not properly validated. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device or cause the device to reload, resulting in a DoS condition.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C731397-28D1-430F-99E0-F0BC98BB5AB0",
              "versionEndExcluding": "1.0.03.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv340_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6822600-E716-4F22-AF34-AD2914D6C128",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9599A29D-0C3D-43F4-B2D5-49EA0AD21692",
              "versionEndExcluding": "1.0.03.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E29320-5668-4F48-9BA1-DC81B256320B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98978F6F-4127-411B-9FAD-14338DFD62BC",
              "versionEndExcluding": "1.0.03.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv345_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1ED87-3FDB-42CA-AA96-508B5F7B9206",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6AD3449-D5B7-4232-B7F9-5042BF7DF2EA",
              "versionEndExcluding": "1.0.03.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv345p_dual_wan_gigabit_poe_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF972452-70D7-4026-A326-ACDD7446DD9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the Secure Sockets Layer (SSL) VPN feature of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause the device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because HTTP requests are not properly validated. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device or cause the device to reload, resulting in a DoS condition."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la funcionalidad Secure Sockets Layer (SSL) VPN de Cisco Small Business RV340, RV340W, RV345, y RV345P Dual WAN Gigabit VPN Routers, podr\u00eda permitir a un atacante remoto no autenticado ejecutar c\u00f3digo arbitrario en un dispositivo afectado o causar la recarga del dispositivo, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad se presenta porque las peticiones HTTP no son comprobadas apropiadamente. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n HTTP dise\u00f1ada por medio de una conexi\u00f3n SSL hacia un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario remotamente en el dispositivo o causar que el dispositivo se vuelva a cargar, resultando en una condici\u00f3n DoS"
    }
  ],
  "id": "CVE-2020-3357",
  "lastModified": "2024-11-21T05:30:52.210",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-16T18:15:18.050",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rce-dos-9ZAjkx4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rce-dos-9ZAjkx4"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 14:37
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device. This vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin.
Impacted products
Vendor Product Version
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.00.29
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.00.33
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.01.16
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.01.17
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.01.18
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.01.20
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.02.16
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.15
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.16
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.17
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.18
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.19
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.20
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.21
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.22
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.24
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.26
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.27
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.28
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.29
cisco rv340_dual_wan_gigabit_vpn_router -
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.00.29
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.00.33
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.01.16
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.01.17
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.01.18
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.01.20
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.02.16
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.15
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.16
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.17
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.18
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.19
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.20
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.21
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.22
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.24
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.26
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.27
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.28
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.29
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router -
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.00.29
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.00.33
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.01.16
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.01.17
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.01.18
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.01.20
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.02.16
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.15
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.16
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.17
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.18
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.19
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.20
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.21
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.22
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.24
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.26
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.27
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.28
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.29
cisco rv345_dual_wan_gigabit_vpn_router -
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.00.29
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.00.33
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.01.16
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.01.17
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.01.18
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.01.20
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.02.16
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.15
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.16
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.17
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.18
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.19
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.20
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.21
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.22
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.24
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.26
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.27
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.28
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.29
cisco rv345p_dual_wan_gigabit_poe_vpn_router -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBAD013E-3550-4157-B52A-F045DEFB0810",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "566AF5EF-B7BD-4F4A-9D5E-82588207C80E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0B4BB7F-FE4B-404D-9977-AAA3D492634B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6BCBFF6-9A31-48BD-B93D-598564A3BB30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB20575D-3E22-49CA-91DE-CBACF2146D3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8836DC95-1076-4CC4-8A6C-34F3ACCA312A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "45488336-CAF5-4F15-BB6E-5BEBD87A4F97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB498AAC-2FAC-4FCC-B644-1180627A5D1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "744B76F8-1276-42ED-8913-5FC9E11F2F2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4D7663-50E6-45B1-8701-2DF2D7F744AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0E4341D-9FD4-4AAD-A5BE-35B0909A8FE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A1EFF8-024B-46F6-A7E3-FCC593314B1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D4C611-38FD-4BF1-B478-03F01283EAC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4788385E-133A-4908-97A0-135403424DA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "150DE44A-A558-4C15-8028-C301259E5ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5E8D98-570C-49A1-9934-45BBCD02AB6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9FF79A-BEE5-4204-B2C5-E0943DCD7773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15F5D4D-A256-4A2E-9873-F0514F81CA77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ACFBF35-E5B2-4807-AC7D-E3021EAAEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1379E9-D147-48F4-AE3A-860B49EFA497",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv340_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6822600-E716-4F22-AF34-AD2914D6C128",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BC16280-4809-4B2C-825C-76A99392F95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A112271-F32C-49F5-B6DA-4DDBBB146106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "133E4C64-B9C8-4B65-927D-39B7BDF89AC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACD9ECA7-1DC4-4122-9D02-B258A62A2FA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A19846-F451-4578-A25B-F3777BE90C35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A69964DE-67E6-4B1C-B3D2-C9177A891C40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB3346A2-D0FB-4AE7-87C0-793DE49D555B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B366BB-EC50-4C1A-ACFA-61C86714FE1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "29C253B5-DAAD-45F0-8A45-B6F44FC74DAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "4893D744-9041-4C89-A33C-8BB989B3FDFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB31F2B-3A74-45DD-B21E-A698E321BA6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE2B1CD-E350-4C5D-BAA6-17138A8343F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "03FFDBF2-939C-46A3-BA90-6DED64474338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "426C4FDC-AAF3-4726-80D0-7C48B06A7E65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E08A813B-630D-4EF4-812B-9E81A48A1DC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27B5644-BA7B-4442-A539-337F93238479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9504523A-37F0-417A-99B4-CABE21E5E744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE54D030-093B-4267-8169-C2DCF72605D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "D70E0828-1150-44FD-82C2-C441A3ACF644",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1C0171B-4C5D-4C15-84DD-E556C5AFDCBA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E29320-5668-4F48-9BA1-DC81B256320B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C44874-31B8-4872-9973-4444D15B09B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "005FADE6-BF4F-416A-965A-46BF5F6C6D0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F78C801-EC2A-4B28-9ED1-A30E3589C3F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2218EEEA-BB4D-4343-BB9F-3C01EA473342",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "609583B2-4D32-4E76-AA9B-DA24A1BAFB16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "59D15056-B04A-40F1-A6D4-66A91FCE5A75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "217B02B2-B4E6-40E7-993C-238D7FBEBFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5659BD61-EE0C-49BF-8484-034A58BA32E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B9B65AE-D6EF-4A2E-9C2D-D96E64506080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "383D6202-4215-46F5-9AA8-F7348997B99A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "55939AC6-77E2-43E6-956C-B0B99CEAB315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385BD9B-80C6-4E54-A4A9-EEA724E58FE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "64CA692C-2D66-483B-A440-746A998CED07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4AEE39-5EE2-43C7-80DC-B078A9953D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FA6AFD-7A8E-4505-8E4F-3A06199E6697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "36FE60B1-EE9F-4034-9612-482E2EECFBEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCCD1FC1-6029-4DDC-898C-169E429D1FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1E99B3-ACEA-48C1-A649-497D5960F215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A69806-3B9F-46E5-877B-9477E3AF0A34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D01F5A-1CC5-4C52-AB70-5DF41588EF98",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv345_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1ED87-3FDB-42CA-AA96-508B5F7B9206",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2812299-2A3C-49AA-9E81-BE4AA50F0D8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "20569E42-E769-401B-8163-3981C7905943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "105566D1-80A2-4545-9BF9-B3382162CA48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468D852-CA7F-4561-9F0E-DB6A056A5F31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "C72F80EF-787D-4A5E-9B03-5215AD400571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D7C66E-AF9E-4419-B6CE-3489DC19212E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "041D9323-A320-4492-BAC7-4E0B06FF56E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D047F9E-7BCE-4F7E-B334-426F46CFCE66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E8D977-F28F-46D9-8DA2-7A1746F4278F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "A87D53D4-AF6F-4E5C-A7A4-099294029C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "42672D7D-5265-4323-A284-F36722F7C36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71CFA39-CF25-4B37-855A-7816770633ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2649FFCF-D9E1-466A-A7ED-4A2653259A3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "743D74FF-2334-4C16-BDDD-FDFD4EEBF9EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "29AF1721-2676-4FDA-97E0-55E53A03AC16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3005E36-D17A-498B-9BF4-1D972FA03553",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFD115E4-53C8-4E3C-9024-4AE5F1F5DFB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D0231F8-CC96-4F02-9737-654FECFCF624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C600D9E-4DDF-45A2-8760-749F0FB06513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "B675841D-7591-492F-BCF0-E63D416C7F1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv345p_dual_wan_gigabit_poe_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF972452-70D7-4026-A326-ACDD7446DD9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device.\r\n\r\nThis vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores VPN Gigabit de doble WAN Cisco Small Business RV340, RV340W, RV345 y RV345P podr\u00eda permitir que un atacante remoto autenticado eleve los privilegios en un dispositivo afectado. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en web revela informaci\u00f3n confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una entrada HTTP manipulada a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante eleve los privilegios de invitado a administrador."
    }
  ],
  "id": "CVE-2024-20393",
  "lastModified": "2024-10-08T14:37:39.713",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-10-02T17:15:15.337",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-285"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-16 18:15
Modified
2024-11-21 05:30
Summary
A vulnerability in the Secure Sockets Layer (SSL) VPN feature for Cisco Small Business RV VPN Routers could allow an unauthenticated, remote attacker to cause the device to unexpectedly restart, causing a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to the targeted device. A successful exploit could allow the attacker to cause a reload, resulting in a DoS condition.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C731397-28D1-430F-99E0-F0BC98BB5AB0",
              "versionEndExcluding": "1.0.03.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv340_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6822600-E716-4F22-AF34-AD2914D6C128",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9599A29D-0C3D-43F4-B2D5-49EA0AD21692",
              "versionEndExcluding": "1.0.03.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E29320-5668-4F48-9BA1-DC81B256320B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98978F6F-4127-411B-9FAD-14338DFD62BC",
              "versionEndExcluding": "1.0.03.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv345_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1ED87-3FDB-42CA-AA96-508B5F7B9206",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6AD3449-D5B7-4232-B7F9-5042BF7DF2EA",
              "versionEndExcluding": "1.0.03.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv345p_dual_wan_gigabit_poe_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF972452-70D7-4026-A326-ACDD7446DD9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the Secure Sockets Layer (SSL) VPN feature for Cisco Small Business RV VPN Routers could allow an unauthenticated, remote attacker to cause the device to unexpectedly restart, causing a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to the targeted device. A successful exploit could allow the attacker to cause a reload, resulting in a DoS condition."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la funcionalidad Secure Sockets Layer (SSL) VPN para Cisco Small Business RV VPN Routers, podr\u00eda permitir a un atacante remoto no autenticado causar el reinicio inesperado del dispositivo, causando una condici\u00f3n de denegaci\u00f3n de servicio (DoS). La vulnerabilidad es debido a una falta de una comprobaci\u00f3n de entrada apropiada de las peticiones HTTP. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una petici\u00f3n HTTP dise\u00f1ada por medio de una conexi\u00f3n SSL al dispositivo objetivo. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante causar una recarga, resultando en una condici\u00f3n DoS"
    }
  ],
  "id": "CVE-2020-3358",
  "lastModified": "2024-11-21T05:30:52.327",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-16T18:15:18.173",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-dos-ZN5GvNH7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-dos-ZN5GvNH7"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-09 16:55
Summary
A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. In order to exploit this vulnerability, the attacker must have valid admin credentials. This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.
Impacted products
Vendor Product Version
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.00.29
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.00.33
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.01.16
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.01.17
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.01.18
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.01.20
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.02.16
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.15
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.16
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.17
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.18
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.19
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.20
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.21
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.22
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.24
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.26
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.27
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.28
cisco rv340_dual_wan_gigabit_vpn_router_firmware 1.0.03.29
cisco rv340_dual_wan_gigabit_vpn_router -
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.00.29
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.00.33
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.01.16
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.01.17
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.01.18
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.01.20
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.02.16
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.15
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.16
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.17
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.18
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.19
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.20
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.21
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.22
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.24
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.26
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.27
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.28
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware 1.0.03.29
cisco rv340w_dual_wan_gigabit_wireless-ac_vpn_router -
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.00.29
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.00.33
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.01.16
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.01.17
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.01.18
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.01.20
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.02.16
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.15
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.16
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.17
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.18
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.19
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.20
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.21
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.22
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.24
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.26
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.27
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.28
cisco rv345_dual_wan_gigabit_vpn_router_firmware 1.0.03.29
cisco rv345_dual_wan_gigabit_vpn_router -
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.00.29
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.00.33
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.01.16
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.01.17
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.01.18
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.01.20
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.02.16
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.15
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.16
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.17
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.18
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.19
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.20
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.21
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.22
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.24
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.26
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.27
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.28
cisco rv345p_dual_wan_gigabit_poe_vpn_router_firmware 1.0.03.29
cisco rv345p_dual_wan_gigabit_poe_vpn_router -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBAD013E-3550-4157-B52A-F045DEFB0810",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "566AF5EF-B7BD-4F4A-9D5E-82588207C80E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0B4BB7F-FE4B-404D-9977-AAA3D492634B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6BCBFF6-9A31-48BD-B93D-598564A3BB30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB20575D-3E22-49CA-91DE-CBACF2146D3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8836DC95-1076-4CC4-8A6C-34F3ACCA312A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "45488336-CAF5-4F15-BB6E-5BEBD87A4F97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB498AAC-2FAC-4FCC-B644-1180627A5D1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "744B76F8-1276-42ED-8913-5FC9E11F2F2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4D7663-50E6-45B1-8701-2DF2D7F744AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0E4341D-9FD4-4AAD-A5BE-35B0909A8FE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A1EFF8-024B-46F6-A7E3-FCC593314B1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D4C611-38FD-4BF1-B478-03F01283EAC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4788385E-133A-4908-97A0-135403424DA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "150DE44A-A558-4C15-8028-C301259E5ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B5E8D98-570C-49A1-9934-45BBCD02AB6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9FF79A-BEE5-4204-B2C5-E0943DCD7773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15F5D4D-A256-4A2E-9873-F0514F81CA77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ACFBF35-E5B2-4807-AC7D-E3021EAAEE94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1379E9-D147-48F4-AE3A-860B49EFA497",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv340_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6822600-E716-4F22-AF34-AD2914D6C128",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BC16280-4809-4B2C-825C-76A99392F95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A112271-F32C-49F5-B6DA-4DDBBB146106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "133E4C64-B9C8-4B65-927D-39B7BDF89AC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACD9ECA7-1DC4-4122-9D02-B258A62A2FA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A19846-F451-4578-A25B-F3777BE90C35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A69964DE-67E6-4B1C-B3D2-C9177A891C40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB3346A2-D0FB-4AE7-87C0-793DE49D555B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B366BB-EC50-4C1A-ACFA-61C86714FE1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "29C253B5-DAAD-45F0-8A45-B6F44FC74DAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "4893D744-9041-4C89-A33C-8BB989B3FDFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB31F2B-3A74-45DD-B21E-A698E321BA6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE2B1CD-E350-4C5D-BAA6-17138A8343F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "03FFDBF2-939C-46A3-BA90-6DED64474338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "426C4FDC-AAF3-4726-80D0-7C48B06A7E65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "E08A813B-630D-4EF4-812B-9E81A48A1DC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27B5644-BA7B-4442-A539-337F93238479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9504523A-37F0-417A-99B4-CABE21E5E744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE54D030-093B-4267-8169-C2DCF72605D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "D70E0828-1150-44FD-82C2-C441A3ACF644",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1C0171B-4C5D-4C15-84DD-E556C5AFDCBA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E29320-5668-4F48-9BA1-DC81B256320B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C44874-31B8-4872-9973-4444D15B09B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "005FADE6-BF4F-416A-965A-46BF5F6C6D0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F78C801-EC2A-4B28-9ED1-A30E3589C3F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2218EEEA-BB4D-4343-BB9F-3C01EA473342",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "609583B2-4D32-4E76-AA9B-DA24A1BAFB16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "59D15056-B04A-40F1-A6D4-66A91FCE5A75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "217B02B2-B4E6-40E7-993C-238D7FBEBFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5659BD61-EE0C-49BF-8484-034A58BA32E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B9B65AE-D6EF-4A2E-9C2D-D96E64506080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "383D6202-4215-46F5-9AA8-F7348997B99A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "55939AC6-77E2-43E6-956C-B0B99CEAB315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2385BD9B-80C6-4E54-A4A9-EEA724E58FE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "64CA692C-2D66-483B-A440-746A998CED07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4AEE39-5EE2-43C7-80DC-B078A9953D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FA6AFD-7A8E-4505-8E4F-3A06199E6697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "36FE60B1-EE9F-4034-9612-482E2EECFBEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCCD1FC1-6029-4DDC-898C-169E429D1FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1E99B3-ACEA-48C1-A649-497D5960F215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A69806-3B9F-46E5-877B-9477E3AF0A34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D01F5A-1CC5-4C52-AB70-5DF41588EF98",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv345_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF1ED87-3FDB-42CA-AA96-508B5F7B9206",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.00.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2812299-2A3C-49AA-9E81-BE4AA50F0D8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.00.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "20569E42-E769-401B-8163-3981C7905943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "105566D1-80A2-4545-9BF9-B3382162CA48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468D852-CA7F-4561-9F0E-DB6A056A5F31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "C72F80EF-787D-4A5E-9B03-5215AD400571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.01.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D7C66E-AF9E-4419-B6CE-3489DC19212E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.02.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "041D9323-A320-4492-BAC7-4E0B06FF56E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D047F9E-7BCE-4F7E-B334-426F46CFCE66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E8D977-F28F-46D9-8DA2-7A1746F4278F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "A87D53D4-AF6F-4E5C-A7A4-099294029C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "42672D7D-5265-4323-A284-F36722F7C36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71CFA39-CF25-4B37-855A-7816770633ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2649FFCF-D9E1-466A-A7ED-4A2653259A3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "743D74FF-2334-4C16-BDDD-FDFD4EEBF9EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "29AF1721-2676-4FDA-97E0-55E53A03AC16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3005E36-D17A-498B-9BF4-1D972FA03553",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFD115E4-53C8-4E3C-9024-4AE5F1F5DFB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D0231F8-CC96-4F02-9737-654FECFCF624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C600D9E-4DDF-45A2-8760-749F0FB06513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:1.0.03.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "B675841D-7591-492F-BCF0-E63D416C7F1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:rv345p_dual_wan_gigabit_poe_vpn_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF972452-70D7-4026-A326-ACDD7446DD9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. In order to exploit this vulnerability, the attacker must have valid admin credentials.\r\n\r\nThis vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de los enrutadores VPN Gigabit de doble WAN Cisco Small Business RV340, RV340W, RV345 y RV345P podr\u00eda permitir que un atacante remoto autenticado ejecute c\u00f3digo arbitrario en un dispositivo afectado. Para aprovechar esta vulnerabilidad, el atacante debe tener credenciales de administrador v\u00e1lidas. Esta vulnerabilidad existe porque la interfaz de administraci\u00f3n basada en web no valida de manera suficiente la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una entrada HTTP manipulada a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante ejecute c\u00f3digo arbitrario como usuario ra\u00edz en el sistema operativo subyacente."
    }
  ],
  "id": "CVE-2024-20470",
  "lastModified": "2024-10-09T16:55:23.887",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.2,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-10-02T17:15:17.027",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-146"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}