Critical Bug Proclaimed in Cisco VPN Routers for Businesses!

Different critical flaw was reported as CVE-2021-1289 through CVE-2021-1295 that was able to impact the router having the model no RV160, RV160W, RV260, RV260W, and RV260P firmware after the release of version 1.0.01.02.

Cisco had fixed out various vulnerabilities present in web-based management while dealing with small business routers that are misguided to the allowed unauthorized remote attacker and they will run the arbitrary code as the root user on the victim’s system.

Apart from that, there are three more vulnerabilities, patches have also been released with two more arbitrary files write flaws as CVE-2021-1296 and CVE-2021-1297 that affect the similar set of VPN routers that could be made it possible and overwrite the arbitrary files on the infected machine.

According to the security researcher Takeshi Shiomitsu, all nine security issues that are reported were connected to networking equipment maker and uncovered the same errors in RV110W, RV130W, and RV215W routers that also used to initiate Remote Code Execution attacks.

What Cisco Addressed?

Critical Bug Proclaimed in Cisco VPN Routers for Businesses

Cisco spokesperson said some specific vulnerabilities are still unclear mentioned below-

  • CVE-2021-1296 and CVE-2021-1297 are having insufficient validation and they have authorized the attacker to execute the flaws using a web-based management program to update a file into the location that they haven’t access.
  • CVE-2021-1289, CVE-2021-1290, CVE-2021-1292, CVE-2021-1293, CVE-2021-1294, and CVE-2021-1295 are also caused insufficient validation of HTTP requests and assist the hacker to craft a special request to the web-based management services and establish remote code execution.
  • CVE-2021-1314, CVE-2021-1315, CVE-2021-1316, CVE-2021-1317, and CVE-2021-1318 also have glitches while managing the interface of Small Business that includes RV016, RV042G, RV042, RV082, RV320 and RV325 routers that helps the hackers to inject the arbitrary commands on the routers and executes the root privileges and all.

The company also identified 30 additional vulnerabilities from CVE-2021-1319 to CVE-2021-1348) that also affect the same products and permits the authorized remote connection to execute the arbitrary code which results in DOS condition.

Remaining Up

While exploiting these vulnerabilities, the hackers need to get the administrator credentials of the affected device. The company also said that there is no strong evidence of any activated exploit by any of these errors and not any workarounds that identified the vulnerabilities.

Leave a Reply