• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – FormBook Malware – Active IOCs
February 2, 2022
Rewterz Threat Advisory – Multiple Google Chrome Vulnerabilities
February 3, 2022

Rewterz Threat Advisory – Multiple Cisco Products Vulnerabilities

February 3, 2022

Severity

Medium

Analysis Summary

CVE-2022-20680

Cisco Prime Service Catalog could allow a remote authenticated attacker to obtain sensitive information, caused by improper enforcement of Administrator privilege levels for low-value sensitive data in the web-based management interface. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to collect sensitive information about users of the system and orders that have been placed using the application.

CVE-2022-20738

Cisco Umbrella Secure Web Gateway could allow a remote attacker to bypass security restrictions, caused by insufficient restrictions in the file inspection feature. By downloading a specially crafted payload through specific methods, an attacker could exploit this vulnerability to bypass file inspection protections and download a malicious payload.

CVE-2022-20630

Cisco DNA Center could allow a local authenticated attacker to obtain sensitive information, caused by the unsecured logging of sensitive information in the audit log. By accessing the audit logs through the CLI, an attacker could exploit this vulnerability to view sensitive information in clear text.

CVE-2022-20712

Cisco Small Business RV Series Routers could allow a remote attacker to execute arbitrary code on the system, caused by insufficient boundary checks when processing specific HTTP requests in the upload module. By sending specially crafted HTTP requests, an attacker could exploit this vulnerability to execute arbitrary code on the system elevated privileges.

CVE-2022-20710

Cisco Small Business RV Series Routers are vulnerable to a denial of service, caused by erroneously handled exceptions during failed login attempts. By sending a specially crafted HJTTP packet, a remote attacker could exploit this vulnerability to prevent users from logging in to the affected device.

CVE-2022-20749

Cisco Small Business and Dual WAN Gigabit VPN Routers could allow a remote attacker to execute arbitrary commands on the system, caused by insufficient validation of user-supplied input in the web-based management interface. By sending specially crafted input, an attacker could exploit this vulnerability to inject and execute arbitrary commands on the system.

CVE-2022-20708

Cisco Small Business and Dual WAN Gigabit VPN Routers could allow a remote attacker to execute arbitrary commands on the system, caused by insufficient validation of user-supplied input in the web-based management interface. By sending specially crafted input, an attacker could exploit this vulnerability to inject and execute arbitrary commands on the system.

CVE-2022-20707

Cisco Small Business and Dual WAN Gigabit VPN Routers could allow a remote attacker to execute arbitrary commands on the system, caused by insufficient validation of user-supplied input in the web-based management interface. By sending specially crafted input, an attacker could exploit this vulnerability to inject and execute arbitrary commands on the system.

CVE-2022-20706

Cisco Small Business RV Series Routers could allow a remote attacker to execute arbitrary commands on the system, caused by insufficient validation of user-supplied input in the Open Plug and Play (PnP) module. By sending specially crafted input, an attacker in the man-in-the-middle position or have an established foothold on a specific network device that is connected to the vulnerable router could exploit this vulnerability to inject and execute arbitrary commands on the system.

CVE-2022-20705

Cisco Small Business RV Series Routers could allow a remote attacker to bypass security restrictions, caused by the use of weak entropy for session identifier generation functions in the session management of the web UI. By crafting a new, valid session identifier and bypassing the whole authentication mechanism, an attacker could exploit this vulnerability to obtain partial administrative privileges and perform unauthorized actions.

CVE-2022-20704

Cisco Small Business RV Series Routers could allow a remote attacker to bypass security restrictions, caused by improper validation of the SSL server certificate that is received when establishing a connection to specific remote servers. By using man-in-the-middle techniques to intercept the traffic between the affected device and the server, an attacker could exploit this vulnerability to force the affected device to download arbitrary software images and launch further attacks.

CVE-2022-20703

Cisco Small Business RV Series Routers could allow a local attacker to bypass security restrictions, caused by improper verification of software images in the software image verification feature. By loading unsigned software on the device, an attacker could exploit this vulnerability to install and boot a malicious software image or execute unsigned binaries on the device.

CVE-2022-20702

Cisco Small Business RV Series Routers could allow a local authenticated attacker to gain elevated privileges on the system, caused by insufficient authorization enforcement mechanisms in the web-based management interface. By submitting specific commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system with root privileges.

CVE-2022-20701

Cisco Small Business RV Series Routers could allow a local attacker to gain elevated privileges on the system, caused by insufficient authorization enforcement mechanisms in the web-based management interface. By submitting specific commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system with root privileges.

CVE-2022-20700

Cisco Small Business RV Series Routers could allow a remote attacker to gain elevated privileges on the system, caused by insufficient authorization enforcement mechanisms in the web-based management interface. By submitting specific commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system with root privileges.

CVE-2022-20699

Cisco Small Business and Dual WAN Gigabit VPN Routers could allow a remote attacker to execute arbitrary code on the system, caused by insufficient boundary checks when processing specific HTTP requests. By sending specially crafted HTTP requests, an attacker could exploit this vulnerability to execute arbitrary code on the system with root privileges.

Please note that the Cisco Small Business RV Series Routers’ vulnerabilities are critical and require urgent patching. 

Impact

  • Information Theft
  • Privilege Escalation
  • Code Execution
  • Security Bypass
  • Denial of Service

Affected Vendors

Cisco

Affected Products

  • Cisco Prime Service Catalog
  • Cisco Umbrella Secure Web Gateway
  • Cisco DNA Center
  • Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router
  • Cisco RV340 Dual WAN Gigabit VPN Router
  • Cisco RV345 Dual WAN Gigabit VPN Router

Remediation

Refer to Cisco Security Advisory for patch, upgrade or suggested workaround information:

  • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpsc-info-disc-zkJBDJ9F
  • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p
  • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-info-disc-8QEynKEj
  • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D

Please note that the Cisco Small Business RV Series Routers’ vulnerabilities are critical and require urgent patching. 

  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.