Vulnerability Details : CVE-2021-1413
Multiple vulnerabilities in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code with elevated privileges equivalent to the web service process on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device.
Vulnerability category: Execute code
Products affected by CVE-2021-1413
- cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:rv340w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:rv345_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:rv345p_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-1413
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-1413
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
6.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
Cisco Systems, Inc. | |
6.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
NIST |
CWE ids for CVE-2021-1413
-
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.Assigned by: ykramarz@cisco.com (Primary)
References for CVE-2021-1413
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv34x-rce-8bfG2h6b
Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Authenticated Remote Code Execution VulnerabilitiesVendor Advisory
-
https://www.zerodayinitiative.com/advisories/ZDI-21-558/
ZDI-21-558 | Zero Day InitiativeThird Party Advisory;VDB Entry
Jump to