2021-34730 | Cisco RV110W/RV130/RV130W/RV215W UPnP Request stack-based overflow (cisco-sa-cisco-sb-rv-overflow-htpymMB5)

CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score
9.4 $5k-$25k 1.06

A vulnerability classified as very critical was found in Cisco RV110W, RV130, RV130W and RV215W (Router Operating System) (affected version unknown). Affected by this vulnerability is some unknown processing of the component UPnP Request Handler. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-121. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:

A vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of incoming UPnP traffic. An attacker could exploit this vulnerability by sending a crafted UPnP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a DoS condition. Cisco has not released software updates that address this vulnerability.

The weakness was disclosed 08/19/2021 as cisco-sa-cisco-sb-rv-overflow-htpymMB5. The advisory is shared at tools.cisco.com. This vulnerability is known as CVE-2021-34730 since 06/15/2021. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn’t need any form of authentication. Neither technical details nor an exploit are publicly available. The price for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 08/21/2021).

Upgrading eliminates this vulnerability.




VulDB Meta Base Score: 9.8
VulDB Meta Temp Score: 9.4

VulDB Base Score: 9.8
VulDB Temp Score: 9.4
VulDB Vector: 🔒
VulDB Reliability: 🔍

🔍 🔍 🔍 🔍 🔍 🔍
🔍 🔍 🔍 🔍 🔍 🔍
🔍 🔍 🔍 🔍 🔍 🔍
Vector Complexity Authentication Confidentiality Integrity Availability
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Memory corruption
CWE: CWE-121
ATT&CK: Unknown

Local: No
Remote: Yes

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: tools.cisco.com

06/15/2021 CVE assigned
08/19/2021 +65 days Advisory disclosed
08/19/2021 +0 days VulDB entry created
08/21/2021 +2 days VulDB last updateVendor: https://www.cisco.com/

Advisory: cisco-sa-cisco-sb-rv-overflow-htpymMB5
Status: Confirmed

CVE: CVE-2021-34730 (🔒)

Created: 08/19/2021 06:49
Updated: 08/21/2021 10:29
Changes: (1) source_cve_cna
Complete: 🔍

See the underground prices here!

Source link