CVE-2021-1308
Published Apr 8, 2021
Last updated a year ago
Overview
- Description
- Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.4
- Impact score
- 4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.1
- Impact score
- 6.9
- Exploitability score
- 6.5
- Vector string
- AV:A/AC:L/Au:N/C:N/I:N/A:C
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv132w_firmware:1.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C12141B-531E-44A5-AD79-16504B31D384" }, { "criteria": "cpe:2.3:o:cisco:rv132w_firmware:1.0.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5759C3B-CE24-47A4-8513-A2C24028973E" }, { "criteria": "cpe:2.3:o:cisco:rv132w_firmware:1.0.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CB50517-FD1B-4207-B63B-4E33F7654E2E" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv132w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8511C48D-9EA6-4521-988C-61E1035BEFA1" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv134w_firmware:1.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2835C440-025B-414F-BED1-5DA20431E726" }, { "criteria": "cpe:2.3:o:cisco:rv134w_firmware:1.0.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1E2F2A9-4118-4778-94AB-C996A6F56F0F" }, { "criteria": "cpe:2.3:o:cisco:rv134w_firmware:1.0.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62CC81E5-DA22-47A1-9D02-00A86DED8D96" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv134w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "39710CC4-1891-4E4B-AF65-AC2577CC8FFC" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv160_firmware:1.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAA1FCAC-F214-46F5-B2D7-751B24865236" }, { "criteria": "cpe:2.3:o:cisco:rv160_firmware:1.0.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF13C864-9853-453C-B495-6C642DE9CB69" }, { "criteria": "cpe:2.3:o:cisco:rv160_firmware:1.0.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA85E0EA-C194-4683-BA09-7C68080924E0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv160:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EC1DC21D-8C6C-4CE7-B5CB-8646659B02BC" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv160w_firmware:1.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F75F5D34-CED9-4390-AC75-7F592175DD67" }, { "criteria": "cpe:2.3:o:cisco:rv160w_firmware:1.0.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79A57FFD-BA26-4F6E-B45F-2DF212908843" }, { "criteria": "cpe:2.3:o:cisco:rv160w_firmware:1.0.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95130A28-C573-4BDF-ABDB-45EE96E94406" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv160w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2B7E3792-5D0F-4CCC-874D-512059CA8E12" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv260_firmware:1.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AA93AAF-F894-44AE-98D6-DBF868AC4EBB" }, { "criteria": "cpe:2.3:o:cisco:rv260_firmware:1.0.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEE01B7F-692D-405D-938D-35E83C62D8F2" }, { "criteria": "cpe:2.3:o:cisco:rv260_firmware:1.0.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEA38FA6-CACA-4553-853C-E36D6395C3E4" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv260:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6FFC99C1-954E-408B-8A08-C79941350F05" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv260p_firmware:1.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A035A4A-B82A-4F0B-8D38-4DD280037C11" }, { "criteria": "cpe:2.3:o:cisco:rv260p_firmware:1.0.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD084D1A-A03D-4854-9727-76C1FBC1A265" }, { "criteria": "cpe:2.3:o:cisco:rv260p_firmware:1.0.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDA8B5D4-821E-48CB-81EA-943BD1039087" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv260p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A62A6E2F-FA43-4F40-A684-651FEDAC2114" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv260w_firmware:1.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F84DC383-4F05-4294-9008-B5223353526D" }, { "criteria": "cpe:2.3:o:cisco:rv260w_firmware:1.0.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5DC3490-6E60-4806-874D-E23572DEAF35" }, { "criteria": "cpe:2.3:o:cisco:rv260w_firmware:1.0.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FED3BFB-7AA7-4A49-B911-58D7CBE8D704" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv260w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "95737F9F-1779-4AAB-875E-2CD586A8B780" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv340_firmware:1.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFC9C7EC-388E-476D-A444-EE9BEE3FD578" }, { "criteria": "cpe:2.3:o:cisco:rv340_firmware:1.0.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41A8558B-85AC-442A-9E3E-27EC127C5B33" }, { "criteria": "cpe:2.3:o:cisco:rv340_firmware:1.0.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD473F62-964C-4D15-B0B6-D9D4AB8E2C1B" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv340w_firmware:1.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4165E6FA-C876-45B4-B48A-7B1D51A028BA" }, { "criteria": "cpe:2.3:o:cisco:rv340w_firmware:1.0.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B8FB0F6-CAE9-481C-9FC7-69CA0660F506" }, { "criteria": "cpe:2.3:o:cisco:rv340w_firmware:1.0.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35729306-0CFF-4ACD-B77D-172A92FD67DF" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv345_firmware:1.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "784C42BE-E7CD-45F0-8209-436F54812C1D" }, { "criteria": "cpe:2.3:o:cisco:rv345_firmware:1.0.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEA2331F-521F-4987-83A1-6D0D458B41DB" }, { "criteria": "cpe:2.3:o:cisco:rv345_firmware:1.0.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90F3DC42-58C9-4BC4-AFCC-077C0BDAAB2E" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5E91E68B-CBE9-462E-82D4-6F588B8E84E8" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv345p_firmware:1.0.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FB2292D-20C8-4929-9802-7FC770952200" }, { "criteria": "cpe:2.3:o:cisco:rv345p_firmware:1.0.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E16124B-9448-47A0-A6BF-A95B37446E91" }, { "criteria": "cpe:2.3:o:cisco:rv345p_firmware:1.0.1.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "948587E0-67B8-4A80-AFAA-96A22F522F42" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5120BAB7-FB3A-481E-9ECD-48341846AFBD" } ], "operator": "OR" } ], "operator": "AND" } ]