// For flags

CVE-2022-20923

Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers IPSec VPN Server Authentication Bypass Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability in the IPSec VPN Server authentication functionality of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to bypass authentication controls and access the IPSec VPN network. This vulnerability is due to the improper implementation of the password validation algorithm. An attacker could exploit this vulnerability by logging in to the VPN from an affected device with crafted credentials. A successful exploit could allow the attacker to bypass authentication and access the IPSec VPN network. The attacker may obtain privileges that are the same level as an administrative user, depending on the crafted credentials that are used. Cisco has not released software updates that address this vulnerability.

Una vulnerabilidad en la funcionalidad de autenticación del Servidor VPN IPSec de los enrutadores RV110W, RV130, RV130W y RV215W de Cisco Small Business podría permitir a un atacante remoto no autenticado omitir los controles de autenticación y acceder a la red VPN IPSec. Esta vulnerabilidad es debido a una implementación inapropiada del algoritmo de comprobación de contraseñas. Un atacante podría explotar esta vulnerabilidad al iniciar sesión en la VPN desde un dispositivo afectado con credenciales manipuladas. Una explotación con éxito podría permitir al atacante omitir la autenticación y acceder a la red VPN IPSec. El atacante puede obtener privilegios del mismo nivel que un usuario administrativo, según las credenciales manipuladas que se utilicen. Cisco no ha publicado actualizaciones de software que aborden esta vulnerabilidad

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2021-11-02 CVE Reserved
  • 2022-09-08 CVE Published
  • 2024-08-22 EPSS Updated
  • 2024-11-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
  • CWE-303: Incorrect Implementation of Authentication Algorithm
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Rv110w Firmware
Search vendor "Cisco" for product "Rv110w Firmware"
1.0.3.55
Search vendor "Cisco" for product "Rv110w Firmware" and version "1.0.3.55"
-
Affected
in Cisco
Search vendor "Cisco"
Rv110w
Search vendor "Cisco" for product "Rv110w"
--
Safe
Cisco
Search vendor "Cisco"
Rv110w Firmware
Search vendor "Cisco" for product "Rv110w Firmware"
1.2.2.8
Search vendor "Cisco" for product "Rv110w Firmware" and version "1.2.2.8"
-
Affected
in Cisco
Search vendor "Cisco"
Rv110w
Search vendor "Cisco" for product "Rv110w"
--
Safe
Cisco
Search vendor "Cisco"
Rv110w Firmware
Search vendor "Cisco" for product "Rv110w Firmware"
1.3.1.7
Search vendor "Cisco" for product "Rv110w Firmware" and version "1.3.1.7"
-
Affected
in Cisco
Search vendor "Cisco"
Rv110w
Search vendor "Cisco" for product "Rv110w"
--
Safe
Cisco
Search vendor "Cisco"
Rv130 Firmware
Search vendor "Cisco" for product "Rv130 Firmware"
1.0.3.55
Search vendor "Cisco" for product "Rv130 Firmware" and version "1.0.3.55"
-
Affected
in Cisco
Search vendor "Cisco"
Rv130
Search vendor "Cisco" for product "Rv130"
--
Safe
Cisco
Search vendor "Cisco"
Rv130 Firmware
Search vendor "Cisco" for product "Rv130 Firmware"
1.2.2.8
Search vendor "Cisco" for product "Rv130 Firmware" and version "1.2.2.8"
-
Affected
in Cisco
Search vendor "Cisco"
Rv130
Search vendor "Cisco" for product "Rv130"
--
Safe
Cisco
Search vendor "Cisco"
Rv130 Firmware
Search vendor "Cisco" for product "Rv130 Firmware"
1.3.1.7
Search vendor "Cisco" for product "Rv130 Firmware" and version "1.3.1.7"
-
Affected
in Cisco
Search vendor "Cisco"
Rv130
Search vendor "Cisco" for product "Rv130"
--
Safe
Cisco
Search vendor "Cisco"
Rv130w Firmware
Search vendor "Cisco" for product "Rv130w Firmware"
1.0.3.55
Search vendor "Cisco" for product "Rv130w Firmware" and version "1.0.3.55"
-
Affected
in Cisco
Search vendor "Cisco"
Rv130w
Search vendor "Cisco" for product "Rv130w"
--
Safe
Cisco
Search vendor "Cisco"
Rv130w Firmware
Search vendor "Cisco" for product "Rv130w Firmware"
1.2.2.8
Search vendor "Cisco" for product "Rv130w Firmware" and version "1.2.2.8"
-
Affected
in Cisco
Search vendor "Cisco"
Rv130w
Search vendor "Cisco" for product "Rv130w"
--
Safe
Cisco
Search vendor "Cisco"
Rv130w Firmware
Search vendor "Cisco" for product "Rv130w Firmware"
1.3.1.7
Search vendor "Cisco" for product "Rv130w Firmware" and version "1.3.1.7"
-
Affected
in Cisco
Search vendor "Cisco"
Rv130w
Search vendor "Cisco" for product "Rv130w"
--
Safe
Cisco
Search vendor "Cisco"
Rv215w Firmware
Search vendor "Cisco" for product "Rv215w Firmware"
1.0.3.55
Search vendor "Cisco" for product "Rv215w Firmware" and version "1.0.3.55"
-
Affected
in Cisco
Search vendor "Cisco"
Rv215w
Search vendor "Cisco" for product "Rv215w"
--
Safe
Cisco
Search vendor "Cisco"
Rv215w Firmware
Search vendor "Cisco" for product "Rv215w Firmware"
1.2.2.8
Search vendor "Cisco" for product "Rv215w Firmware" and version "1.2.2.8"
-
Affected
in Cisco
Search vendor "Cisco"
Rv215w
Search vendor "Cisco" for product "Rv215w"
--
Safe
Cisco
Search vendor "Cisco"
Rv215w Firmware
Search vendor "Cisco" for product "Rv215w Firmware"
1.3.1.7
Search vendor "Cisco" for product "Rv215w Firmware" and version "1.3.1.7"
-
Affected
in Cisco
Search vendor "Cisco"
Rv215w
Search vendor "Cisco" for product "Rv215w"
--
Safe