ID

VAR-202105-0633


CVE

CVE-2021-1520


TITLE

plural  Cisco RV Dual WAN Gigabit VPN  Vulnerability regarding the state where any value can be written to any location on the router

Trust: 0.8

sources: JVNDB: JVNDB-2021-006594

DESCRIPTION

A vulnerability in the internal message processing of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, local attacker to run arbitrary commands with root privileges on the underlying operating system (OS). This vulnerability exists because an internal messaging service does not properly sanitize input. An attacker could exploit this vulnerability by first authenticating to the device and then sending a crafted request to the internal service. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying OS. To exploit this vulnerability, the attacker must have valid Administrator credentials for the device. plural Cisco RV Dual WAN Gigabit VPN A router is vulnerable to a state where any value can be written to any location.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 2.25

sources: NVD: CVE-2021-1520 // JVNDB: JVNDB-2021-006594 // CNNVD: CNNVD-202104-975 // VULMON: CVE-2021-1520

AFFECTED PRODUCTS

vendor:ciscomodel:rv345scope:ltversion:1.0.03.21

Trust: 1.0

vendor:ciscomodel:rv345pscope:ltversion:1.0.03.21

Trust: 1.0

vendor:ciscomodel:rv340scope:ltversion:1.0.03.21

Trust: 1.0

vendor:ciscomodel:rv340wscope:ltversion:1.0.03.21

Trust: 1.0

vendor:シスコシステムズmodel:rv340w dual wan gigabit wireless-ac vpn routerscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:rv345p dual wan gigabit poe vpn routerscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:rv345 dual wan gigabit vpn routerscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:rv340 dual wan gigabit vpn routerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-006594 // NVD: CVE-2021-1520

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-1520
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1520
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-1520
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202105-138
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-1520
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-1520
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-1520
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2021-1520
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-1520 // JVNDB: JVNDB-2021-006594 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-138 // NVD: CVE-2021-1520 // NVD: CVE-2021-1520

PROBLEMTYPE DATA

problemtype:CWE-123

Trust: 1.0

problemtype:A state in which any value can be written to any location (CWE-123) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-006594 // NVD: CVE-2021-1520

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202105-138

TYPE

other

Trust: 1.2

sources: CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-138

PATCH

title:cisco-sa-rv-34x-privesc-GLN8ZAQEurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-34x-privesc-GLN8ZAQE

Trust: 0.8

title:Cisco router Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=150782

Trust: 0.6

title:Cisco: Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Local Privilege Escalation Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-rv-34x-privesc-GLN8ZAQE

Trust: 0.1

sources: VULMON: CVE-2021-1520 // JVNDB: JVNDB-2021-006594 // CNNVD: CNNVD-202105-138

EXTERNAL IDS

db:NVDid:CVE-2021-1520

Trust: 3.3

db:JVNDBid:JVNDB-2021-006594

Trust: 0.8

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:AUSCERTid:ESB-2021.1539

Trust: 0.6

db:CS-HELPid:SB2021050711

Trust: 0.6

db:CNNVDid:CNNVD-202105-138

Trust: 0.6

db:VULMONid:CVE-2021-1520

Trust: 0.1

sources: VULMON: CVE-2021-1520 // JVNDB: JVNDB-2021-006594 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-138 // NVD: CVE-2021-1520

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-rv-34x-privesc-gln8zaqe

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1520

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021050711

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1539

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/123.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.iot-inspector.com/blog/advisory-cisco-rv34x-series-privilege-escalation-vpntimer/

Trust: 0.1

sources: VULMON: CVE-2021-1520 // JVNDB: JVNDB-2021-006594 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-138 // NVD: CVE-2021-1520

SOURCES

db:VULMONid:CVE-2021-1520
db:JVNDBid:JVNDB-2021-006594
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202105-138
db:NVDid:CVE-2021-1520

LAST UPDATE DATE

2024-08-14T13:07:21.646000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-1520date:2021-05-14T00:00:00
db:JVNDBid:JVNDB-2021-006594date:2022-01-13T09:10:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202105-138date:2021-05-18T00:00:00
db:NVDid:CVE-2021-1520date:2023-11-07T03:28:30.407

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-1520date:2021-05-06T00:00:00
db:JVNDBid:JVNDB-2021-006594date:2022-01-13T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202105-138date:2021-05-05T00:00:00
db:NVDid:CVE-2021-1520date:2021-05-06T13:15:11.027