Vulnerability identifier: #VU60250
Vulnerability risk: Low
CVSSv4.0: 7 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear]
CVE-ID:
CWE-ID:
CWE-347
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Cisco RV340 Dual WAN Gigabit VPN Router
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco RV345 Dual WAN Gigabit VPN Router
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco RV345P Dual WAN Gigabit VPN Router
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Cisco Systems, Inc
Description
The vulnerability allows an attacker to compromise the affected device.
The vulnerability exists due to improper cryptographic signature verification of software images as they are installed on an affected device.An attacker with physical access to device can install and boot a malicious software image or execute unsigned binaries on an affected device.Mitigation
Install updates from vendor's website.
Vulnerable software versions
Cisco RV340 Dual WAN Gigabit VPN Router: 1.0.0.33 - 1.0.03.24
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router: 1.0.01.16 - 1.0.03.24
Cisco RV345 Dual WAN Gigabit VPN Router: 1.0.0.33 - 1.0.03.24
Cisco RV345P Dual WAN Gigabit VPN Router: 1.0.0.33 - 1.0.03.24
External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.