Language:
http://www.nessus.org/u?d880707f
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz88279
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz94704
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa12732
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa12748
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa12836
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa13115
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa13119
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa13205
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa13682
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa13836
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa13882
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa13888
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa13900
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14007
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14008
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14564
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14565
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14601
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14602
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa15167
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa15168
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa18769
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa18770
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa32432
Severity: Critical
ID: 157361
File Name: cisco-sa-smb-mult-vuln-KA9PK6D.nasl
Version: 1.17
Type: remote
Family: CISCO
Published: 2/3/2022
Updated: 4/25/2023
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-20749
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/h:cisco:rv340w, cpe:/h:cisco:rv345p, cpe:/h:cisco:rv345, cpe:/h:cisco:rv260, x-cpe:/o:cisco:small_business_rv_series_router_firmware, cpe:/h:cisco:rv260w, cpe:/h:cisco:rv160w, cpe:/h:cisco:rv260p, cpe:/h:cisco:rv340, cpe:/h:cisco:rv160
Required KB Items: Cisco/Small_Business_Router/Version, Cisco/Small_Business_Router/Model
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/28/2022
Vulnerability Publication Date: 2/2/2022
CISA Known Exploited Vulnerability Due Dates: 3/17/2022
Metasploit (Cisco RV340 SSL VPN Unauthenticated Remote Code Execution)
CVE: CVE-2022-20699, CVE-2022-20700, CVE-2022-20701, CVE-2022-20702, CVE-2022-20703, CVE-2022-20704, CVE-2022-20705, CVE-2022-20706, CVE-2022-20707, CVE-2022-20708, CVE-2022-20709, CVE-2022-20710, CVE-2022-20711, CVE-2022-20712, CVE-2022-20749
CWE: 121, 269, 285, 295, 347, 362, 434, 552, 754, 77, 785
CISCO-SA: cisco-sa-smb-mult-vuln-KA9PK6D
IAVA: 2022-A-0058
CISCO-BUG-ID: CSCvz88279, CSCvz94704, CSCwa12732, CSCwa12748, CSCwa12836, CSCwa13115, CSCwa13119, CSCwa13205, CSCwa13682, CSCwa13836, CSCwa13882, CSCwa13888, CSCwa13900, CSCwa14007, CSCwa14008, CSCwa14564, CSCwa14565, CSCwa14601, CSCwa14602, CSCwa15167, CSCwa15168, CSCwa18769, CSCwa18770, CSCwa32432, CSCwa36774, CSCwa54598