{"id":2739,"date":"2021-08-05T20:47:53","date_gmt":"2021-08-05T15:17:53","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=2739"},"modified":"2021-08-05T20:47:55","modified_gmt":"2021-08-05T15:17:55","slug":"cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/","title":{"rendered":"Cisco fixes Sensitive, High Severity Pre-Auth Errors in VPN Routers"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">Cisco has identified pre-auth security vulnerabilities impacting numerous small Business VPN routers and permitting remote attackers to trigger a denial of service condition or run commands and arbitrary code on vulnerable devices.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The two security errors tracked as CVE-2021-1609 (rated 9.8\/10) and CVE-2021-1602 (8.2\/10) were discovered in the web-based management interfaces and exist due to improperly validate HTTP requests and insufficient user input validation, respectively.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">CVE-2021-1609 impacts RV340W, RV340, RV345, and RV345P Dual WAN Gigabit VPN routers, while CVE-2021-1602 harms RV160, RV160W, RV260, RV260P, and RV260W VPN routers.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Both of these two flaws are exploitable remotely without needing authentication as a part of low complexity attacks that don\u2019t need any user interaction.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Threat actors exploit the vulnerabilities by transmitting maliciously designed HTTP requests to the affected routers&#8217; web-based management interfaces.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Remote Management Disabled on all the Impacted Routers?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Fortunately, as the organization explains, the remote management feature is disabled by default on all the affected VPN router models. \u201cThe web-based management interface for these devices is available through local LAN connections by default and cannot be disabled there,\u201d Cisco stated.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cThe interface can also be available through the WAN interface by allowing the remote management feature. By default, the remote management feature is disabling on the victim devices.\u201d<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">To know whether remote management is enabled on your devices, you have to launch the router\u2019s web-based management interface via a local LAN connection and check if the Basic Settings &gt; Remote Management option is switched on.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Cisco has also released software updates to address these vulnerabilities and says no workarounds are available to remove the attack vectors.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">To download the patched firmware from Cisco\u2019s Software Center, you need to click Browse All on Cisco.com and go to Downloads Home &gt; Routers &gt; Small Business Routers &gt; Small Business RV Series Routers.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Disable in<\/strong>&nbsp;<strong>Wild Exploitation<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"292\" height=\"172\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Cisco-fixes-Sensitive-High-Severity-Pre-Auth-Errors-in-VPN-Routers-image1.jpg\" alt=\"Cisco-fixes-Sensitive-High-Severity-Pre-Auth-Errors-in-VPN-Routers-image1\" class=\"wp-image-2741\"\/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">While Cisco says that its \u201cProduct Security Incident Response Team (PSIRT) is not fully familiar of any public announcements or malicious use\u201d of the two security errors, similar router vulnerabilities have been targeted in the past by attackers in the wild.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">In August 2020, Cisco alerted of constantly exploited zero-day bugs (CVE-2020-3566 and CVE-2020-3569) in carrier-grade IOS XR routers with multicast routing enabled. The organization patched the zero-days during late September 2020, one month after the first warning.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">After one month, in October 2020, Cisco was frequently alerted of attacks constantly targeting a separate high severity vulnerability (CVE-2020-3118) affecting the IOS XR Network OS setup on the same router models.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">On the same day, the US Nation Security Agency (NSA) included CVE-2020-3118 among 25 security vulnerabilities targeted or exploited by Chinese state-sponsored threat actors.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">In July 2020, Cisco fixed the other constantly exploited ASA\/FTD firewall flaw and a pre-auth sensitive remote code execution (RCE) error that might lead to full device takeover on vulnerable devices.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco has identified pre-auth security vulnerabilities impacting numerous small Business VPN routers and permitting remote attackers to trigger a denial of service condition or run commands and arbitrary code on vulnerable devices. The two security errors tracked as CVE-2021-1609 (rated 9.8\/10) and CVE-2021-1602 (8.2\/10) were discovered in the web-based management interfaces and exist due to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2742,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cisco fixes Sensitive, High Severity Pre-Auth Errors in VPN Routers - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco fixes Sensitive, High Severity Pre-Auth Errors in VPN Routers - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Cisco has identified pre-auth security vulnerabilities impacting numerous small Business VPN routers and permitting remote attackers to trigger a denial of service condition or run commands and arbitrary code on vulnerable devices. The two security errors tracked as CVE-2021-1609 (rated 9.8\/10) and CVE-2021-1602 (8.2\/10) were discovered in the web-based management interfaces and exist due to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-05T15:17:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-05T15:17:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Cisco-fixes-Sensitive-High-Severity-Pre-Auth-Errors-in-VPN-Routers-feature-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Cisco fixes Sensitive, High Severity Pre-Auth Errors in VPN Routers\",\"datePublished\":\"2021-08-05T15:17:53+00:00\",\"dateModified\":\"2021-08-05T15:17:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/\"},\"wordCount\":497,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/\",\"url\":\"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/\",\"name\":\"Cisco fixes Sensitive, High Severity Pre-Auth Errors in VPN Routers - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-08-05T15:17:53+00:00\",\"dateModified\":\"2021-08-05T15:17:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco fixes Sensitive, High Severity Pre-Auth Errors in VPN Routers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cisco fixes Sensitive, High Severity Pre-Auth Errors in VPN Routers - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/","og_locale":"en_US","og_type":"article","og_title":"Cisco fixes Sensitive, High Severity Pre-Auth Errors in VPN Routers - Xiarch Solutions Private Limited","og_description":"Cisco has identified pre-auth security vulnerabilities impacting numerous small Business VPN routers and permitting remote attackers to trigger a denial of service condition or run commands and arbitrary code on vulnerable devices. The two security errors tracked as CVE-2021-1609 (rated 9.8\/10) and CVE-2021-1602 (8.2\/10) were discovered in the web-based management interfaces and exist due to [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-08-05T15:17:53+00:00","article_modified_time":"2021-08-05T15:17:55+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Cisco-fixes-Sensitive-High-Severity-Pre-Auth-Errors-in-VPN-Routers-feature-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Cisco fixes Sensitive, High Severity Pre-Auth Errors in VPN Routers","datePublished":"2021-08-05T15:17:53+00:00","dateModified":"2021-08-05T15:17:55+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/"},"wordCount":497,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/","url":"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/","name":"Cisco fixes Sensitive, High Severity Pre-Auth Errors in VPN Routers - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-08-05T15:17:53+00:00","dateModified":"2021-08-05T15:17:55+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/cisco-fixes-sensitive-high-severity-pre-auth-errors-in-vpn-routers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cisco fixes Sensitive, High Severity Pre-Auth Errors in VPN Routers"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2739"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=2739"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2739\/revisions"}],"predecessor-version":[{"id":2743,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2739\/revisions\/2743"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/2742"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=2739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=2739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=2739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}