Fixes for Cisco Pre-Auth Bugs in VPN Routers

Two security bugs, tracked as CVE-2021-1609 and CVE-2021-1602 were discovered in the web-based management interfaces and are due to poorly validated HTTP requests and bad user input validation. The bugs impact multiple Small Business VPN routers and allow attackers to issue DoS or execute commands and arbitrary code on vulnerable victim machines.


CVE-2021-1609

Vulnerable Products: 

  • RV340 Dual WAN Gigabit VPN Router
  • RV340W Dual WAN Gigabit Wireless-AC VPN Router
  • RV345 Dual WAN Gigabit VPN Router
  • RV345P Dual WAN Gigabit POE VPN Router


CVE-2021-1602

Vulnerable Products:

  • RV160 VPN Routers
  • RV160W Wireless-AC VPN Routers
  • RV260 VPN Routers
  • RV260P VPN Router with POE
  • RV260W Wireless-AC VPN Routers



Cisco explains that remote management is, by default, disabled on all of the affected VPN routers. In order to verify this, administrators need to open the router's web-based management interface via local LAN and double-check that the Basic Settings > Remote Management option is toggled off. Cisco has since released some updates to address these bugs and says that there are no options for workarounds to remove the attack vectors. A great example of an exploitable feature being included but toggled off is a welcome change of pace.

As of yet, Cisco's Product Security Incident Response Team (PSIRT) is not aware of any exploitation in the wild.

References:

CVE-2021-1609

CVE-2021-1602


Comments

Popular posts from this blog

Russian GRU Unit 29155 recent operations