CVE ID: CVE-2022-20699
A vulnerability in the SSL VPN module of Cisco Small Business RV Series routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device.
This vulnerability is due to inadequate boundary checks in the processing of certain HTTP requests. An attacker could take advantage of this vulnerability by sending malicious HTTP requests to the affected device acting as an SSL VPN gateway. A successful exploit could allow the attacker to remotely execute code with root privileges on the affected device.
RV340 Dual WAN Gigabit VPN Router
RV340W Dual WAN Gigabit Wireless AC VPN Router
RV345 Dual WAN Gigabit VPN Router
RV345P Dual WAN Gigabit POE VPN Router
RV160 and RV260 Series Routers
1.0.01.05 and earlier
1.0.01.07 (except CVE-2022-20705)
RV340 and RV345 Series Routers
Also, there are other critical vulnerabilities (see Other vulnerabilities) that are (partially) fixed by the software patch (see Cisco Security Advisory).
We strongly recommend updating the affected Cisco products to the latest version, as there are already proof of concept exploits that make it easier for inexperienced attackers to exploit this vulnerability(ies). For those products that do not yet have an update, no workaround exists either. However, updates will follow in the course of the month. Until there are, we recommend disabling the SSL VPN gateway. We are already in the process of integrating these vulnerabilities into our scan engines.
There are other vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 series routers that could allow an attacker to perform any of the following:
Execute arbitrary code
Execute arbitrary commands
Bypass authentication and authorization protections
Fetch and run unsigned software
Cause denial of service (DoS)
More information on these vulnerabilities and updates on software patches can be read here.
We have entered into a distribution partnership with campusLan, the leading distributor for the education sector in the DACH region. Together with the Austrian distribution partners, we want to bring educational institutions of all sizes to the next level of cyber security.
In the world of cybercrime, attacks are becoming more efficient and specific. Thanks to automated malware campaigns that use exploit kits to search for vulnerabilities, cybercriminals ace the game. Companies now face the challenge of minimizing their attack surface and eliminating their vulnerabilities.