Goby/json/Cisco-Small-Business-RV-Ser...

78 lines
4.7 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Cisco Small Business RV Series Routers Multiple Command Execution Vulnerabilities (CVE-2022-20705 CVE-2022-20707)",
"Description": "<p>The Cisco Small Business RV series routers are routers developed by Cisco in the United States.</p><p>An arbitrary command execution vulnerability exists in the Cisco Small Business RV series routers. An attacker can first exploit CVE-2022-20705 for session bypass and then exploit CVE-2022-20707 to execute arbitrary code on the affected device.</p>",
"Product": "Cisco Small Business RV Series Routers",
"Homepage": "http://www.houtian-hb.com",
"DisclosureDate": "2021-12-01",
"Author": "Chin_z",
"FofaQuery": "title=\"Cisco RV340\" || title=\"Cisco RV345P\" || title=\"Cisco RV345\"",
"GobyQuery": "title=\"Cisco RV340\" || title=\"Cisco RV345P\" || title=\"Cisco RV345\"",
"Level": "2",
"Impact": "<p>An attacker can first exploit CVE-2022-20705 for session bypass and then exploit CVE-2022-20707 to execute arbitrary code on the affected device.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D\">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>",
"Translation": {
"CN": {
"Name": "Cisco Small Business RV 系列路由器任意命令执行漏洞 CVE-2022-20705 && CVE-2022-20707",
"Product": "Cisco Small Business RV 系列路由器",
"Description": "<p>Cisco Small Business RV 系列路由器是美国 Cisco 公司开发的路由器。</p><p>Cisco Small Business RV 系列路由器存在任意命令执行漏洞。攻击者可以先利用 CVE-2022-20705 进行 session 绕过,随后利用 CVE-2022-20707 在受影响的设备上执行任意代码。</p>",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新: <a href=\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D\">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、如⾮必要禁⽌公⽹访问该系统。</p>",
"Impact": "<p>Cisco Small Business RV160, RV260, RV340, and RV345 等系列路由器存在任意命令执行漏洞。攻击者可以先利用 CVE-2022-20705 进行 session 绕过,随后利用 CVE-2022-20707 在受影响的设备上执行任意代码。</p>",
"VulType": [
"命令执行"
],
"Tags": [
"命令执行"
]
},
"EN": {
"Name": "Cisco Small Business RV Series Routers Multiple Command Execution Vulnerabilities (CVE-2022-20705, CVE-2022-20707)",
"Product": "Cisco Small Business RV Series Routers",
"Description": "<p>The Cisco Small Business RV series routers are routers developed by Cisco in the United States.</p><p>An arbitrary command execution vulnerability exists in the Cisco Small Business RV series routers. An attacker can first exploit CVE-2022-20705 for session bypass and then exploit CVE-2022-20707 to execute arbitrary code on the affected device.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D\">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>",
"Impact": "<p>An attacker can first exploit CVE-2022-20705 for session bypass and then exploit CVE-2022-20707 to execute arbitrary code on the affected device.</p>",
"VulType": [
"rce"
],
"Tags": [
"rce"
]
}
},
"References": [
"https://blog.relyze.com/2022/04/pwning-cisco-rv340-with-4-bug-chain.html"
],
"HasExp": true,
"ExpParams": [
{
"name": "cmd",
"type": "input",
"value": "id"
}
],
"ExpTips": null,
"ScanSteps": null,
"Tags": [
"rce"
],
"VulType": [
"rce"
],
"CVEIDs": [
"CVE-2022-20705"
],
"CVSSScore": "9.0",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"CNNVD": [
"CNNVD-202202-166"
],
"CNVD": [
""
],
"ExploitSteps": null
}