CVE-2023-20073
Published Apr 5, 2023
Last updated a year ago
Overview
- Description
- A vulnerability in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device. This vulnerability is due to insufficient authorization enforcement mechanisms in the context of file uploads. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to upload arbitrary files to the affected device.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6DC9B66-238D-4E9C-A0D6-9AFD09549101", "versionEndIncluding": "1.0.03.29" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2A4411AC-2A74-4315-BA6B-D7E1AA538BDB" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv340w_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02D7BEBD-B700-452C-A2F1-70009217F42F", "versionEndIncluding": "1.0.03.29" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "21E55019-F969-4ACD-A6C8-1D2EE05F8EE4" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv345_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43A9B296-5632-49B9-8830-6C27EF1710A9", "versionEndIncluding": "1.0.03.29" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5E91E68B-CBE9-462E-82D4-6F588B8E84E8" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:rv345p_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61989F1E-A4C9-450D-AF26-B2178108A260", "versionEndIncluding": "1.0.03.29" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5120BAB7-FB3A-481E-9ECD-48341846AFBD" } ], "operator": "OR" } ], "operator": "AND" } ]