On February 3rd, 2021, Cisco announced seven critical vulnerabilities affecting a variety of Cisco Small Business and VPN routers. The seven vulnerabilities allow for remote code execution with root privileges by an unauthenticated user. The vulnerabilities received a criticality rating of 9.8/10.
Exploitation in the wild has not been identified at this time. The high severity of these vulnerabilities and the lack of required authentication for exploitation makes them extremely valuable to threat actors. Organizations are highly recommended to apply the available security patches as soon as possible to avoid potential compromise.
What we’re doing about it
- eSentire security teams continue to track this topic for additional details and detection opportunities
- MVS will automatically add the relevant checks for the vulnerabilities once plugins are made available
What you should do about it
- After performing a business impact review, apply the security patches provided by Cisco (firmware releases 1.0.01.02)
The vulnerabilities are due to a failure to properly validate HTTP requests. In an attack scenario, threat actors could exploit these vulnerabilities by sending a specially crafted HTTP request to the web-based management interface of vulnerable devices.
Confirmed Vulnerable Cisco Small Business Routers:
- RV160 VPN Router
- RV160W Wireless-AC VPN Router
- RV260 VPN Router
- RV260P VPN Router with POE
- RV260W Wireless-AC VPN Router