We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-20393

Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Privilege Escalation Vulnerability



Description

A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device. This vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin.

Reserved 2023-11-08 | Published 2024-10-02 | Updated 2024-10-02 | Assigner cisco


HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Authorization

Product status

Default status
unknown

1.0.01.17
affected

1.0.03.17
affected

1.0.01.16
affected

1.0.01.18
affected

1.0.00.29
affected

1.0.03.16
affected

1.0.03.15
affected

1.0.02.16
affected

1.0.01.20
affected

1.0.00.33
affected

1.0.03.18
affected

1.0.03.19
affected

1.0.03.20
affected

1.0.03.21
affected

1.0.03.22
affected

1.0.03.24
affected

1.0.03.26
affected

1.0.03.27
affected

1.0.03.28
affected

1.0.03.29
affected

References

sec.cloudapps.cisco.com/...sco-sa-rv34x-privesc-rce-qE33TCms (cisco-sa-rv34x-privesc-rce-qE33TCms)

cve.org (CVE-2024-20393)

nvd.nist.gov (CVE-2024-20393)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-20393

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.