eSentire White Logo

Security advisories | Feb 04, 2021

Cisco Critical Router Vulnerabilities

THE THREAT

On February 3rd, 2021, Cisco announced seven critical vulnerabilities affecting a variety of Cisco Small Business and VPN routers. The seven vulnerabilities allow for remote code execution with root privileges by an unauthenticated user. The vulnerabilities received a criticality rating of 9.8/10.

Exploitation in the wild has not been identified at this time. The high severity of these vulnerabilities and the lack of required authentication for exploitation makes them extremely valuable to threat actors. Organizations are highly recommended to apply the available security patches as soon as possible to avoid potential compromise.

What we’re doing about it

  • eSentire security teams continue to track this topic for additional details and detection opportunities
  • MVS will automatically add the relevant checks for the vulnerabilities once plugins are made available

What you should do about it

Additional information

The vulnerabilities are due to a failure to properly validate HTTP requests. In an attack scenario, threat actors could exploit these vulnerabilities by sending a specially crafted HTTP request to the web-based management interface of vulnerable devices.

Confirmed Vulnerable Cisco Small Business Routers:

  • RV160 VPN Router
  • RV160W Wireless-AC VPN Router
  • RV260 VPN Router
  • RV260P VPN Router with POE
  • RV260W Wireless-AC VPN Router

Vulnerability list:

  • CVE-2021-1289
  • CVE-2021-1290
  • CVE-2021-1291
  • CVE-2021-1292
  • CVE-2021-1293
  • CVE-2021-1294
  • CVE-2021-1295

References:

[1] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv160-260-rce-XZeFkNHf