Vulnerability identifier: #VU60258
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-755
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco RV340 Dual WAN Gigabit VPN Router
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco RV345 Dual WAN Gigabit VPN Router
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco RV345P Dual WAN Gigabit VPN Router
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to to erroneously handled exceptions during failed login attempts in the login functionality of the web-based management interface.. A remote non-authenticated attacker can send specially crafted HTTP requests to the affected device and prevent users from logging in.Mitigation
Install updates from vendor's website.
Vulnerable software versions
Cisco RV340 Dual WAN Gigabit VPN Router: 1.0.0.33 - 1.0.03.24
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router: 1.0.01.16 - 1.0.03.24
Cisco RV345 Dual WAN Gigabit VPN Router: 1.0.0.33 - 1.0.03.24
Cisco RV345P Dual WAN Gigabit VPN Router: 1.0.0.33 - 1.0.03.24
External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.