
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN069
_____________________________________________________________________

DATE                : 04/02/2021

HARDWARE PLATFORM(S): Cisco Small Business VPN Routers.

OPERATING SYSTEM(S):  Cisco Small Business VPN Routers software.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-BY4c5zd
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-filewrite-7x9mnKjn
_____________________________________________________________________


Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN
Routers Remote Code Execution Vulnerabilities


Critical


Advisory ID:      cisco-sa-rv160-260-rce-XZeFkNHf
First Published:  2021 February 3 16:00 GMT
Version 1.0:      Final
Workarounds:      No workarounds available
Cisco Bug IDs:    CSCvw13908
                  CSCvw13917
                  CSCvw19718
                  CSCvw19849
                  CSCvw27923
                  CSCvw27982
                  CSCvw50568
CVSS Score:
Base 9.8

CVE-2021-1289
CVE-2021-1290
CVE-2021-1291
CVE-2021-1292
CVE-2021-1293
CVE-2021-1294
CVE-2021-1295

CWE-472


Summary

    Multiple vulnerabilities in the web-based management interface of
Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN
Routers could allow an unauthenticated, remote attacker to execute
arbitrary code as the root user on an affected device.

    These vulnerabilities exist because HTTP requests are not properly
validated. An attacker could exploit these vulnerabilities by sending a
crafted HTTP request to the web-based management interface of an
affected device. A successful exploit could allow the attacker to
remotely execute arbitrary code on the device.

    Cisco has released software updates that address these
vulnerabilities. There are no workarounds that address these
vulnerabilities.

    This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf


Affected Products

    Vulnerable Products

    These vulnerabilities affect the following Cisco Small Business
Routers if they are running a firmware release earlier than Release
1.0.01.02:

        RV160 VPN Router
        RV160W Wireless-AC VPN Router
        RV260 VPN Router
        RV260P VPN Router with POE
        RV260W Wireless-AC VPN Router


    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this
advisory are known to be affected by this these vulnerabilities.

    Cisco has confirmed that these vulnerabilities do not affect the
following Cisco products:
        RV340 Dual WAN Gigabit VPN Router
        RV340W Dual WAN Gigabit Wireless-AC VPN Router
        RV345 Dual WAN Gigabit VPN Router
        RV345P Dual WAN Gigabit POE VPN Router


Workarounds

    There are no workarounds that address these vulnerabilities.


Fixed Software

    Cisco has released free software updates that address the
vulnerabilities described in this advisory. Customers may only install
and expect support for software versions and feature sets for which they
have purchased a license. By installing, downloading, accessing, or
otherwise using such software upgrades, customers agree to follow the
terms of the Cisco software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they
have a valid license, procured from Cisco directly, or through a Cisco
authorized reseller or partner. In most cases this will be a maintenance
upgrade to software that was previously purchased. Free security
software updates do not entitle customers to a new software license,
additional software feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to
regularly consult the advisories for Cisco products, which are available
from the Cisco Security Advisories page, to determine exposure and a
complete upgrade solution.

    In all cases, customers should ensure that the devices to be
upgraded contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their contracted
maintenance providers.


    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco
service contract and customers who make purchases through third-party
vendors but are unsuccessful in obtaining fixed software through their
point of sale should obtain upgrades by contacting the Cisco TAC:
https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be
prepared to provide the URL of this advisory as evidence of entitlement
to a free upgrade.


    Fixed Releases

    Cisco fixed these vulnerabilities in firmware releases 1.0.01.02 and
later for Cisco RV160, RV160W, RV260, RV260P, and RV260W Routers.

    To download the software from the Software Center on Cisco.com, do
the following:

        Click Browse all.
        Choose Routers > Small Business Routers > Small Business RV
Series Routers.
        Choose the appropriate router.
        Choose Small Business Router Firmware.
        Choose a release from the left pane of the product page.


Exploitation and Public Announcements

    The Cisco Product Security Incident Response Team (PSIRT) is not
aware of any public announcements or malicious use of the
vulnerabilities that are described in this advisory.

Source

    Cisco would like to thank the following people for reporting these
vulnerabilities:

        T. Shiomitsu working with Trend Micro Zero Day Initiative for
CVE-2021-1289, CVE-2021-1290, CVE-2021-1291, CVE-2021-1292,
CVE-2021-1293, and CVE-2021-1294.
        swings of Chaitin Security Research Lab for CVE-2021-1293
        simp1e of 1AQ Team and swings of Chaitin Security Research Lab
for CVE-2021-1295


URL


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf


Revision History

Version 	Description 	Section 	Status 	Date
1.0 	Initial public release. 	— 	Final 	2021-FEB-03


Legal Disclaimer

    THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT
YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that
omits the distribution URL is an uncontrolled copy and may lack
important information or contain factual errors. The information in this
document is intended for end users of Cisco products.

_____________________________________________________________________

Cisco Small Business RV Series Routers Management Interface Remote
Command Execution and Denial of Service Vulnerabilities

High


Advisory ID:       cisco-sa-rv-overflow-ghZP68yj
First Published:   2021 February 3 16:00 GMT
Version 1.0:       Final
Workarounds:       No workarounds available
Cisco Bug IDs:     CSCvv97027
                   CSCvv97031
                   CSCvv97034
                   More...
CVSS Score:        Base 7.2

CVE-2021-1319
CVE-2021-1320
CVE-2021-1321
More...

CWE-121


Summary

    Multiple vulnerabilities in the web-based management interface of
Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325
Routers could allow an authenticated, remote attacker to execute
arbitrary code or cause an affected device to restart unexpectedly.

    These vulnerabilities are due to improper validation of
user-supplied input in the web-based management interface. An attacker
could
exploit these vulnerabilities by sending crafted HTTP requests to an
affected device. A successful exploit could allow the attacker to
execute arbitrary code as the root user on the underlying operating
system or cause the device to reload, resulting in a denial of service
(DoS) condition. To exploit these vulnerabilities, an attacker would
need to have valid administrator credentials on the affected device.

    Cisco has released software updates that address these
vulnerabilities. There are no workarounds that address these
vulnerabilities.

    This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj


Affected Products

    Vulnerable Products

    These vulnerabilities affect the following Cisco Small Business
routers and firmware releases:

    Product 	Firmware Release
    RV016 Multi-WAN VPN Routers 	4.2.3.14 and earlier
    RV042 Dual WAN VPN Routers 	4.2.3.14 and earlier
    RV042G Dual Gigabit WAN VPN Routers 	4.2.3.14 and earlier
    RV082 Dual WAN VPN Routers 	4.2.3.14 and earlier
    RV320 Dual Gigabit WAN VPN Routers 	1.5.1.11 and earlier
    RV325 Dual Gigabit WAN VPN Routers 	1.5.1.11 and earlier

    The web-based management interface of these devices is available
through a local LAN connection, which cannot be disabled, or through the
WAN connection if the remote management feature is enabled. By default,
the remote management feature is disabled for these devices.

    Determine the Device Configuration

    To determine whether the remote management feature is enabled for a
device, open the web-based management interface and choose Basic
Settings > Remote Management. If the Enable check box is checked, remote
management is enabled for the device.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this
advisory are known to be affected by these vulnerabilities.


Workarounds

    There are no workarounds that address these vulnerabilities.

Fixed Software

    Cisco has released free software updates that address the
vulnerabilities described in this advisory. Customers may only install
and expect support for software versions and feature sets for which they
have purchased a license. By installing, downloading, accessing, or
otherwise using such software upgrades, customers agree to follow the
terms of the Cisco software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they
have a valid license, procured from Cisco directly, or through a Cisco
authorized reseller or partner. In most cases this will be a maintenance
upgrade to software that was previously purchased. Free security
software updates do not entitle customers to a new software license,
additional software feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to
regularly consult the advisories for Cisco products, which are available
from the Cisco Security Advisories page, to determine exposure and a
complete upgrade solution.

    In all cases, customers should ensure that the devices to be
upgraded contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their contracted
maintenance providers.


    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco
service contract and customers who make purchases through third-party
vendors but are unsuccessful in obtaining fixed software through their
point of sale should obtain upgrades by contacting the Cisco TAC:
https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be
prepared to provide the URL of this advisory as evidence of entitlement
to a free upgrade.


    Fixed Releases

    Cisco fixed these vulnerabilities in Cisco RV320 and RV325 Dual
Gigabit WAN VPN Routers Firmware Release 1.5.1.13.

    Cisco has not released and will not release firmware updates for the
Cisco RV016, RV042, RV042G, and RV082 Routers to address the
vulnerabilities described in this advisory. These products have entered
the end-of-life process. Customers are advised to refer to the
end-of-life notices for these products:

        End-of-Sale and End-of-Life Announcement for the Cisco RV016
Multi-WAN VPN Router

        End-of-Sale and End-of-Life Announcement for the Cisco RV042 and
RV042G VPN Router (all models)

        End-of-Sale and End-of-Life Announcement for the Cisco RV082
Dual WAN VPN Router

    Customers who are running Cisco RV016, RV042, RV042G, and RV082
Routers are encouraged to migrate to the Cisco Small Business RV340 Dual
WAN Gigabit VPN Router.

    When considering a device migration, customers are advised to
regularly consult the advisories for Cisco products, which are available
from the Cisco Security Advisories page, to determine exposure and a
complete upgrade solution.

    In all cases, customers should ensure that the new device will be
sufficient for their network needs, that new devices contain sufficient
memory, and that current hardware and software configurations will
continue to be supported properly by the new product. If the information
is not clear, customers are advised to contact the Cisco TAC or their
contracted maintenance providers.


Exploitation and Public Announcements

    The Cisco Product Security Incident Response Team (PSIRT) is not
aware of any public announcements or malicious use of the
vulnerabilities described in this advisory.


Source

    Cisco would like to thank Kai Cheng from Institute of Information
Engineering, Chinese Academy of Sciences for reporting these
vulnerabilities.


URL


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj


Revision History

Version 	Description 	Section 	Status 	Date
1.0 	Initial public release. 	— 	Final 	2021-FEB-03


Legal Disclaimer

    THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT
YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that
omits the distribution URL is an uncontrolled copy and may lack
important information or contain factual errors. The information in this
document is intended for end users of Cisco products.

_____________________________________________________________________

Cisco Small Business RV Series Routers Management Interface Command
Injection Vulnerabilities

High

Advisory ID:       cisco-sa-rv-command-inject-BY4c5zd
First Published:   2021 February 3 16:00 GMT
Version 1.0:       Final
Workarounds:       No workarounds available
Cisco Bug IDs:     CSCvv97021
                   CSCvv97022
                   CSCvv97023
                   CSCvv97024
                   CSCvv97025
CVSS Score:        Base 7.2

CVE-2021-1314
CVE-2021-1315
CVE-2021-1316
CVE-2021-1317
CVE-2021-1318

CWE-20

Summary

    Multiple vulnerabilities in the web-based management interface of
Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325
Routers could allow an authenticated, remote attacker to inject
arbitrary commands that are executed with root privileges.

    These vulnerabilities are due to improper validation of
user-supplied input in the web-based management interface. An attacker
could
exploit these vulnerabilities by sending crafted HTTP requests to a
targeted device. A successful exploit could allow the attacker to
execute arbitrary code as the root user on the underlying operating
system. To exploit these vulnerabilities, an attacker would need to have
valid administrator credentials on an affected device.

    Cisco has released software updates that address these
vulnerabilities. There are no workarounds that address these
vulnerabilities.

    This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-BY4c5zd


Affected Products


    Vulnerable Products

    These vulnerabilities affect the following Cisco Small Business
routers and firmware releases:

    Product 	Firmware Release
    RV016 Multi-WAN VPN Routers 	4.2.3.14 and earlier
    RV042 Dual WAN VPN Routers 	4.2.3.14 and earlier
    RV042G Dual Gigabit WAN VPN Routers 	4.2.3.14 and earlier
    RV082 Dual WAN VPN Routers 	4.2.3.14 and earlier
    RV320 Dual Gigabit WAN VPN Routers 	1.5.1.11 and earlier
    RV325 Dual Gigabit WAN VPN Routers 	1.5.1.11 and earlier

    The web-based management interface of these devices is available
through a local LAN connection, which cannot be disabled, or through the
WAN connection if the remote management feature is enabled. By default,
the remote management feature is disabled for these devices.

    Determine the Device Configuration

    To determine whether the remote management feature is enabled for a
device, open the web-based management interface and choose Basic
Settings > Remote Management. If the Enable check box is checked, remote
management is enabled for the device.


    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this
advisory are known to be affected by these vulnerabilities.


Workarounds

    There are no workarounds that address these vulnerabilities.

Fixed Software

    Cisco has released free software updates that address the
vulnerabilities described in this advisory. Customers may only install
and expect support for software versions and feature sets for which they
have purchased a license. By installing, downloading, accessing, or
otherwise using such software upgrades, customers agree to follow the
terms of the Cisco software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they
have a valid license, procured from Cisco directly, or through a Cisco
authorized reseller or partner. In most cases this will be a maintenance
upgrade to software that was previously purchased. Free security
software updates do not entitle customers to a new software license,
additional software feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to
regularly consult the advisories for Cisco products, which are available
from the Cisco Security Advisories page, to determine exposure and a
complete upgrade solution.

    In all cases, customers should ensure that the devices to be
upgraded contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their contracted
maintenance providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco
service contract and customers who make purchases through third-party
vendors but are unsuccessful in obtaining fixed software through their
point of sale should obtain upgrades by contacting the Cisco TAC:
https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be
prepared to provide the URL of this advisory as evidence of entitlement
to a free upgrade.


    Fixed Releases

    Cisco fixed these vulnerabilities in Cisco RV320 and RV325 Dual
Gigabit WAN VPN Routers Firmware Release 1.5.1.13.

    Cisco has not released and will not release firmware updates for the
Cisco RV016, RV042, RV042G, and RV082 Routers to address the
vulnerabilities described in this advisory. These products have entered
the end-of-life process. Customers are advised to refer to the
end-of-life notices for these products:

        End-of-Sale and End-of-Life Announcement for the Cisco RV016
Multi-WAN VPN Router

        End-of-Sale and End-of-Life Announcement for the Cisco RV042 and
RV042G VPN Router (all models)

        End-of-Sale and End-of-Life Announcement for the Cisco RV082
Dual WAN VPN Router


    Customers who are running Cisco RV016, RV042, RV042G, and RV082
Routers are encouraged to migrate to the Cisco Small Business RV340 Dual
WAN Gigabit VPN Router.

    When considering a device migration, customers are advised to
regularly consult the advisories for Cisco products, which are available
from the Cisco Security Advisories page, to determine exposure and a
complete upgrade solution.

    In all cases, customers should ensure that the new device will be
sufficient for their network needs, that new devices contain sufficient
memory, and that current hardware and software configurations will
continue to be supported properly by the new product. If the information
is not clear, customers are advised to contact the Cisco TAC or their
contracted maintenance providers.


Exploitation and Public Announcements

    The Cisco Product Security Incident Response Team (PSIRT) is not
aware of any public announcements or malicious use of the
vulnerabilities described in this advisory.


Source

    Cisco would like to thank Kai Cheng from Institute of Information
Engineering, Chinese Academy of Sciences for reporting these
vulnerabilities.


URL


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-BY4c5zd


Revision History

Version 	Description 	Section 	Status 	Date
1.0 	Initial public release. 	— 	Final 	2021-FEB-03


Legal Disclaimer

    THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT
YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that
omits the distribution URL is an uncontrolled copy and may lack
important information or contain factual errors. The information in this
document is intended for end users of Cisco products.

_____________________________________________________________________

Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN
Routers Arbitrary File Write Vulnerabilities

High

Advisory ID:       cisco-sa-rv160-260-filewrite-7x9mnKjn
First Published:   2021 February 3 16:00 GMT
Version 1.0:       Final
Workarounds:       No workarounds available
Cisco Bug IDs:     CSCvw19856
                   CSCvw22856

CVSS Score:        Base 7.5
CVE-2021-1296
CVE-2021-1297

CWE-36


Summary

    Multiple vulnerabilities in the web-based management interface of
Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN
Routers could allow an unauthenticated, remote attacker to conduct
directory traversal attacks and overwrite certain files that should be
restricted on an affected system.

    These vulnerabilities are due to insufficient input validation. An
attacker could exploit these vulnerabilities by using the web-based
management interface to upload a file to location on an affected device
that they should not have access to. A successful exploit could allow
the attacker to overwrite files on the file system of the affected
device.

    Cisco has released software updates that address these
vulnerabilities. There are no workarounds that address these
vulnerabilities.

    This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-filewrite-7x9mnKjn


Affected Products

    Vulnerable Products

    These vulnerabilities affect the following Cisco Small Business
Routers if they are running a firmware release earlier than Release
1.0.01.02:

        RV160 VPN Router
        RV160W Wireless-AC VPN Router
        RV260 VPN Router
        RV260P VPN Router with POE
        RV260W Wireless-AC VPN Router


    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this
advisory are known to be affected by these vulnerabilities.


    Cisco has confirmed that these vulnerabilities do not affect the
following Cisco products:

        RV340 Dual WAN Gigabit VPN Router
        RV340W Dual WAN Gigabit Wireless-AC VPN Router
        RV345 Dual WAN Gigabit VPN Router
        RV345P Dual WAN Gigabit POE VPN Router

Workarounds

    There are no workarounds that address these vulnerabilities.


Fixed Software

    Cisco has released free software updates that address the
vulnerabilities described in this advisory. Customers may only install
and expect support for software versions and feature sets for which they
have purchased a license. By installing, downloading, accessing, or
otherwise using such software upgrades, customers agree to follow the
terms of the Cisco software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they
have a valid license, procured from Cisco directly, or through a Cisco
authorized reseller or partner. In most cases this will be a maintenance
upgrade to software that was previously purchased. Free security
software updates do not entitle customers to a new software license,
additional software feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to
regularly consult the advisories for Cisco products, which are available
from the Cisco Security Advisories page, to determine exposure and a
complete upgrade solution.

    In all cases, customers should ensure that the devices to be
upgraded contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their contracted
maintenance providers.


    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco
service contract and customers who make purchases through third-party
vendors but are unsuccessful in obtaining fixed software through their
point of sale should obtain upgrades by contacting the Cisco TAC:
https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be
prepared to provide the URL of this advisory as evidence of entitlement
to a free upgrade.


    Fixed Releases

    Cisco fixed these vulnerabilities in firmware releases 1.0.01.02 and
later for Cisco RV160, RV160W, RV260, RV260P, and RV260W Routers.

    To download the software from the Software Center on Cisco.com, do
the following:

        Click Browse all.
        Choose Routers > Small Business Routers > Small Business RV
Series Routers.
        Choose the appropriate router.
        Choose Small Business Router Firmware.
        Choose a release from the left pane of the product page.


Exploitation and Public Announcements

    The Cisco Product Security Incident Response Team (PSIRT) is not
aware of any public announcements or malicious use of the
vulnerabilities that are described in this advisory.


Source

    Cisco would like to thank T. Shiomitsu working with Trend Micro Zero
Day Initiative for reporting these vulnerabilities.


URL


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-filewrite-7x9mnKjn


Revision History

Version 	Description 	Section 	Status 	Date
1.0 	Initial public release. 	— 	Final 	2021-FEB-03


Legal Disclaimer

    THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT
YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that
omits the distribution URL is an uncontrolled copy and may lack
important information or contain factual errors. The information in this
document is intended for end users of Cisco products.



=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================


