Exploited Bug Bypasses Authentication On Numerous Routers

Share post:

Tenable discovered a vulnerability on April 26 that is actively exploited by threat actors and is tracked as CVE-2021-20090.

The vulnerability affects home routers running Arcadyan firmware, which in turn paves the way for attackers to use malicious payloads from the Mirai botnet.

The vulnerable devices include dozens of router models from multiple providers and ISPs, including Asus, British Telecom, Deutsche Telekom, Orange, O2 (Telefonica), Verizon, Vodafone, Telstra and Telus.

The vulnerability found in the web interfaces of routers with Arcadyan firmware provides unauthenticated remote attackers with access to authentication bypass. Millions of routers are reportedly vulnerable to attack depending on how many router models and vendors are already affected by the bug.

The latest attacks were discovered by researchers from Juniper Threat Labs.

While Juniper Threat Labs “identified some attack patterns that attempt to exploit this vulnerability in the wild coming from an IP address located in Wuhan, Hubei province, China,” the report showed that threat actors actively exploiting the vulnerability could do so with malicious tools similar to those used in a Mirai campaign against IoT and network security using a Mirai botnet variant.

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways