Skip to the content.

DIVD-2023-00009 - Cisco RV Series Remote Command Execution

Our reference DIVD-2023-00009
Case lead Max van der Horst
Researcher(s)
CVE(s)
Product Cisco RV340, RV340W, RV345 and RV345P
Versions
  • Firmware versions < 1.0.03.29
Recommendation Upgrade the firmware of your RV Small Business Router to the latest version (larger than 1.0.03.28).
Status Closed
Last modified 04 Aug 2023 13:04 CEST

Summary

A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345 and RV345P could allow an authenticated, remote attacker to execute arbitrary code. The attacker does need valid administrator credentials.

What you can do

Update your Cisco Small Business Router to the latest firmware release (no earlier than 1.0.03.29).

What we are doing

DIVD is currently scanning for Small Business routers of the mentioned types that are vulnerable. Owners of vulnerable systems receive a notification with instructions to update their router.

Timeline

Date Description
07 Feb 2023 DIVD starts researching the vulnerability.
18 Feb 2023 First version of this casefile.
25 Mar 2023 DIVD conducts a first scan for this vulnerability.
18 Apr 2023 DIVD sends out first round of notifications.
02 May 2023 DIVD conducts a second scan for this vulnerability
04 Aug 2023 Case closed.
gantt title DIVD-2023-00009 - Cisco RV Series Remote Command Execution dateFormat YYYY-MM-DD axisFormat %e %b %Y section Case DIVD-2023-00009 - Cisco RV Series Remote Command Execution (178 days) :2023-02-07, 2023-08-04 section Events DIVD starts researching the vulnerability. : milestone, 2023-02-07, 0d First version of this casefile. : milestone, 2023-02-18, 0d DIVD conducts a first scan for this vulnerability. : milestone, 2023-03-25, 0d DIVD sends out first round of notifications. : milestone, 2023-04-18, 0d DIVD conducts a second scan for this vulnerability : milestone, 2023-05-02, 0d Case closed. : milestone, 2023-08-04, 0d

More information