Cisco on Wednesday issued patches to address eight security vulnerabilities, three of which could be weaponized by an unauthenticated attacker to gain remote code execution (RCE) or cause a denial of service (DoS) condition on devices affected.
The most critical defects affect the Cisco Small Business RV160, RV260, RV340, and RV345 series routers. Tracked as CVE-2022-20842 (CVSS score: 9.8), the vulnerability stems from insufficient authentication of user-provided input to the devices’ web-based management interface.
“An attacker could exploit this vulnerability by sending crafted HTTP logins to an affected device,” Cisco said in an advisory. “A successful exploit could allow an attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to refresh, resulting in a DoS condition.”
A second flaw relates to a command injection vulnerability found in the router’s web filter database update feature (CVE-2022-20827, CVSS score: 9.0), which could be exploited by an adversary to inject and execute arbitrary commands on the underlying operating system with root privileges.
The third router-related flaw to be resolved (CVE-2022-20841, CVSS score: 8.0) is also a command injection flaw in the Open Plug-n-Play (PnP) module that can be abused by sending an with malicious intent to achieve code execution on the target Linux host.
“To exploit this vulnerability, an attacker must use a man-in-the-middle position or have a foothold in a specific network device that is connected to the affected router,” the network equipment manufacturer noted.
Also fixed by Cisco are five moderate security flaws affecting Webex Meetings, Identity Services Engine, Unified Communications Manager, and BroadWorks Application Delivery Platform.
The company did not offer solutions to correct the issues, adding that there is no evidence that these vulnerabilities are being exploited in the wild. That said, customers are advised to move quickly to apply the updates.