ID

VAR-202207-1640


CVE

CVE-2022-20893


TITLE

plural  Cisco  Classic buffer overflow vulnerability in the product

Trust: 0.8

sources: JVNDB: JVNDB-2022-015820

DESCRIPTION

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. plural Cisco The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Cisco Small Business is a switch of Cisco (Cisco) in the United States

Trust: 2.25

sources: NVD: CVE-2022-20893 // JVNDB: JVNDB-2022-015820 // CNVD: CNVD-2022-54905 // VULMON: CVE-2022-20893

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-54905

AFFECTED PRODUCTS

vendor:ciscomodel:rv215wscope:eqversion:1.3.1.7

Trust: 1.6

vendor:ciscomodel:rv130wscope:eqversion:1.3.1.7

Trust: 1.6

vendor:ciscomodel:rv130scope:eqversion:1.3.1.7

Trust: 1.6

vendor:ciscomodel:rv110wscope:eqversion:1.3.1.7

Trust: 1.6

vendor:シスコシステムズmodel:cisco rv215w wireless-n vpn ルータscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco rv130w wireless-n multifunction vpn ルータscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:rv130 vpn ルータscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco rv110w wireless-n vpn firewallscope: - version: -

Trust: 0.8

sources: CNVD: CNVD-2022-54905 // JVNDB: JVNDB-2022-015820 // NVD: CVE-2022-20893

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-20893
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2022-20893
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-20893
value: HIGH

Trust: 0.8

CNVD: CNVD-2022-54905
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202207-2261
value: HIGH

Trust: 0.6

CNVD: CNVD-2022-54905
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:L/AU:M/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-20893
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2022-20893
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 1.2
impactScore: 3.4
version: 3.1

Trust: 1.0

NVD: CVE-2022-20893
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-54905 // JVNDB: JVNDB-2022-015820 // CNNVD: CNNVD-202207-2261 // NVD: CVE-2022-20893 // NVD: CVE-2022-20893

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-015820 // NVD: CVE-2022-20893

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202207-2261

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202207-2261

PATCH

title:cisco-sa-sb-rv-rce-overflow-ygHByAKurl:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK

Trust: 0.8

title:Patch for Cisco Small Business Buffer Overflow Vulnerability (CNVD-2022-54905)url:https://www.cnvd.org.cn/patchInfo/show/342166

Trust: 0.6

title:Cisco Small Business Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=201549

Trust: 0.6

title:Cisco: Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-sb-rv-rce-overflow-ygHByAK

Trust: 0.1

sources: CNVD: CNVD-2022-54905 // VULMON: CVE-2022-20893 // JVNDB: JVNDB-2022-015820 // CNNVD: CNNVD-202207-2261

EXTERNAL IDS

db:NVDid:CVE-2022-20893

Trust: 3.9

db:JVNDBid:JVNDB-2022-015820

Trust: 0.8

db:CNVDid:CNVD-2022-54905

Trust: 0.6

db:CS-HELPid:SB2022072215

Trust: 0.6

db:CNNVDid:CNNVD-202207-2261

Trust: 0.6

db:VULMONid:CVE-2022-20893

Trust: 0.1

sources: CNVD: CNVD-2022-54905 // VULMON: CVE-2022-20893 // JVNDB: JVNDB-2022-015820 // CNNVD: CNNVD-202207-2261 // NVD: CVE-2022-20893

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sb-rv-rce-overflow-yghbyak

Trust: 1.8

url:https://cxsecurity.com/cveshow/cve-2022-20893/

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-20893

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2022072215

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2022-54905 // VULMON: CVE-2022-20893 // JVNDB: JVNDB-2022-015820 // CNNVD: CNNVD-202207-2261 // NVD: CVE-2022-20893

SOURCES

db:CNVDid:CNVD-2022-54905
db:VULMONid:CVE-2022-20893
db:JVNDBid:JVNDB-2022-015820
db:CNNVDid:CNNVD-202207-2261
db:NVDid:CVE-2022-20893

LAST UPDATE DATE

2024-08-14T13:21:59.888000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-54905date:2022-08-03T00:00:00
db:VULMONid:CVE-2022-20893date:2022-07-22T00:00:00
db:JVNDBid:JVNDB-2022-015820date:2023-09-29T01:06:00
db:CNNVDid:CNNVD-202207-2261date:2022-07-27T00:00:00
db:NVDid:CVE-2022-20893date:2023-11-07T03:43:14.640

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-54905date:2022-07-29T00:00:00
db:VULMONid:CVE-2022-20893date:2022-07-22T00:00:00
db:JVNDBid:JVNDB-2022-015820date:2023-09-29T00:00:00
db:CNNVDid:CNNVD-202207-2261date:2022-07-22T00:00:00
db:NVDid:CVE-2022-20893date:2022-07-22T04:15:12.280