Cisco Fixes Vulnerabilities Affecting VPN Routers

Share post:

Cisco has fixed existing pre-auth security vulnerabilities that affect multiple small business VPN routers, allowing remote attackers to cause a denial of service condition or execute commands and arbitrary code on vulnerable devices.

The two vulnerabilities, classified as CVE-2021-1609 (rated 9.8/10) and CVE-2021-1602 (8.2/10) were found in the web-based management interfaces and are due to insufficiently validated HTTP requests and insufficient validation of user input.

CVE-2021-1609 affects RV340, RV340W, RV345 and RV345P Dual WAN Gigabit VPN routers, while CVE-2021-1602 affects RV160, RV160W, RV260, RV260P and RV260W VPN routers.

The two bugs can be remotely exploited without the need for authentication, as part of low-complexity attacks that bypass user interaction.

Attackers could exploit the vulnerabilities by sending malicious HTTP requests to the web-based management interfaces of the affected routers.

However, as the company shows, the remote management feature is disabled by default on all affected VPN router models.

To find out if remote management is enabled on your own devices, the user must open the router’s web-based management interface via a local LAN connection and check that the Basic Settings > Remote Management option is enabled.

Cisco has released software updates to take on these vulnerabilities and says no workarounds are useful to remove the attack vectors.

To download the patched firmware from the Cisco Software Center, click Cisco.com on Browse All and navigate to Downloads Home > Router > Small Business Router > Small Business RV Series Router.

For more information, read the original story in BleepingComputer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways