PatchSiren

PatchSiren cyber security CVE debrief

CVE-2022-20699 Cisco CVE debrief

CVE-2022-20699 affects Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers and is described as a stack-based buffer overflow vulnerability. CISA added it to the Known Exploited Vulnerabilities catalog on 2022-03-03, which makes it a high-priority issue for any organization using the affected router family. The available official guidance is to apply updates per the vendor’s instructions.

Vendor
Cisco
Product
Small Business RV160, RV260, RV340, and RV345 Series Routers
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2022-03-03
Original CVE updated
2022-03-03
Advisory published
2022-03-03
Advisory updated
2022-03-03

Who should care

Administrators and operators responsible for Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers, especially teams managing edge networking equipment and patching exposed infrastructure.

Technical summary

Official sources identify this issue as a stack-based buffer overflow in Cisco Small Business RV Series Routers. The public records provided here do not include exploit prerequisites, impact details, or attack-path specifics, so the safest evidence-based summary is that the vulnerability involves memory corruption in affected router software and has been treated by CISA as a known exploited weakness.

Defensive priority

High. CISA lists CVE-2022-20699 in its Known Exploited Vulnerabilities catalog, which indicates confirmed exploitation risk and makes timely remediation a priority.

Recommended defensive actions

  • Inventory Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers in your environment.
  • Apply updates per Cisco vendor instructions as soon as possible.
  • Confirm remediation on all affected devices rather than relying on a single fleet update record.
  • Prioritize systems that provide critical network access or sit in sensitive segments.
  • Use the CISA KEV catalog entry and Cisco/CVE references to validate that the issue is fully addressed.

Evidence notes

This debrief is limited to the supplied official records: the CVE record, the NVD detail page, and CISA’s Known Exploited Vulnerabilities source. The source corpus explicitly identifies the affected product family, the vulnerability class (stack-based buffer overflow), and KEV dates. No unsupported exploitation details, severity score, or vendor advisory content were used.

Official resources

Publicly disclosed and added to CISA’s Known Exploited Vulnerabilities catalog on 2022-03-03.