PatchSiren cyber security CVE debrief
CVE-2022-20699 Cisco CVE debrief
CVE-2022-20699 affects Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers and is described as a stack-based buffer overflow vulnerability. CISA added it to the Known Exploited Vulnerabilities catalog on 2022-03-03, which makes it a high-priority issue for any organization using the affected router family. The available official guidance is to apply updates per the vendor’s instructions.
- Vendor
- Cisco
- Product
- Small Business RV160, RV260, RV340, and RV345 Series Routers
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2022-03-03
- Original CVE updated
- 2022-03-03
- Advisory published
- 2022-03-03
- Advisory updated
- 2022-03-03
Who should care
Administrators and operators responsible for Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers, especially teams managing edge networking equipment and patching exposed infrastructure.
Technical summary
Official sources identify this issue as a stack-based buffer overflow in Cisco Small Business RV Series Routers. The public records provided here do not include exploit prerequisites, impact details, or attack-path specifics, so the safest evidence-based summary is that the vulnerability involves memory corruption in affected router software and has been treated by CISA as a known exploited weakness.
Defensive priority
High. CISA lists CVE-2022-20699 in its Known Exploited Vulnerabilities catalog, which indicates confirmed exploitation risk and makes timely remediation a priority.
Recommended defensive actions
- Inventory Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers in your environment.
- Apply updates per Cisco vendor instructions as soon as possible.
- Confirm remediation on all affected devices rather than relying on a single fleet update record.
- Prioritize systems that provide critical network access or sit in sensitive segments.
- Use the CISA KEV catalog entry and Cisco/CVE references to validate that the issue is fully addressed.
Evidence notes
This debrief is limited to the supplied official records: the CVE record, the NVD detail page, and CISA’s Known Exploited Vulnerabilities source. The source corpus explicitly identifies the affected product family, the vulnerability class (stack-based buffer overflow), and KEV dates. No unsupported exploitation details, severity score, or vendor advisory content were used.
Official resources
-
CVE-2022-20699 CVE record
CVE.org
-
CVE-2022-20699 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
Publicly disclosed and added to CISA’s Known Exploited Vulnerabilities catalog on 2022-03-03.