Cisco Fixes Vulnerabilities Affecting VPN Routers

Share post:

Cisco has fixed existing pre-auth security vulnerabilities that affect multiple small business VPN routers, allowing remote attackers to cause a denial of service condition or execute commands and arbitrary code on vulnerable devices.

The two vulnerabilities, classified as CVE-2021-1609 (rated 9.8/10) and CVE-2021-1602 (8.2/10) were found in the web-based management interfaces and are due to insufficiently validated HTTP requests and insufficient validation of user input.

CVE-2021-1609 affects RV340, RV340W, RV345 and RV345P Dual WAN Gigabit VPN routers, while CVE-2021-1602 affects RV160, RV160W, RV260, RV260P and RV260W VPN routers.

The two bugs can be remotely exploited without the need for authentication, as part of low-complexity attacks that bypass user interaction.

Attackers could exploit the vulnerabilities by sending malicious HTTP requests to the web-based management interfaces of the affected routers.

However, as the company shows, the remote management feature is disabled by default on all affected VPN router models.

To find out if remote management is enabled on your own devices, the user must open the router’s web-based management interface via a local LAN connection and check that the Basic Settings > Remote Management option is enabled.

Cisco has released software updates to take on these vulnerabilities and says no workarounds are useful to remove the attack vectors.

To download the patched firmware from the Cisco Software Center, click Cisco.com on Browse All and navigate to Downloads Home > Router > Small Business Router > Small Business RV Series Router.

For more information, read the original story in BleepingComputer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Controversial expansion of US surveillance powers nears Senate vote

The US Senate is poised to vote on a significant expansion of Section 702 of the Foreign Intelligence...

Russian-linked hackers target U.S. and European water systems

A Russian military-affiliated hacking group, Sandworm, is suspected of coordinating recent cyberattacks on water utilities in the U.S.,...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways