Fixes for Cisco Pre-Auth Bugs in VPN Routers
Two security bugs, tracked as CVE-2021-1609 and CVE-2021-1602 were discovered in the web-based management interfaces and are due to poorly validated HTTP requests and bad user input validation. The bugs impact multiple Small Business VPN routers and allow attackers to issue DoS or execute commands and arbitrary code on vulnerable victim machines.
CVE-2021-1609
Vulnerable Products:
- RV340 Dual WAN Gigabit VPN Router
- RV340W Dual WAN Gigabit Wireless-AC VPN Router
- RV345 Dual WAN Gigabit VPN Router
- RV345P Dual WAN Gigabit POE VPN Router
CVE-2021-1602
Vulnerable Products:
- RV160 VPN Routers
- RV160W Wireless-AC VPN Routers
- RV260 VPN Routers
- RV260P VPN Router with POE
- RV260W Wireless-AC VPN Routers
Cisco explains that remote management is, by default, disabled on all of the affected VPN routers. In order to verify this, administrators need to open the router's web-based management interface via local LAN and double-check that the Basic Settings > Remote Management option is toggled off. Cisco has since released some updates to address these bugs and says that there are no options for workarounds to remove the attack vectors. A great example of an exploitable feature being included but toggled off is a welcome change of pace.
As of yet, Cisco's Product Security Incident Response Team (PSIRT) is not aware of any exploitation in the wild.
References:
Comments
Post a Comment