Cisco Patches Critical Vulnerabilities in Small Business VPN Routers

 

Cisco Patches Critical Vulnerabilities in Small Business VPN Routers

Cisco released patches for critical vulnerabilities in small business VPN routers. Their exploitation could allow threat actors to execute arbitrary code on vulnerable devices.

These vulnerabilities affect the following Cisco Small Business Routers: RV340 Dual WAN Gigabit VPN Router, RV340W Dual WAN Gigabit Wireless-AC VPN Router, RV345 Dual WAN Gigabit VPN Router and RV345P Dual WAN Gigabit POE VPN Router.

The issue (CVE-2021-1609) has a CVSS score 9.8. The problem exists because of improper HTTP requests validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploitation could allow the attacker to remotely execute arbitrary code on the device or cause the device reloading, resulting in a DoS condition.

The second vulnerability (CVE-2021-1610) is located in the same devices and could result in arbitrary command execution as root. For a successful attack, a hacker has to be authenticated, which lowers the bug’s severity rating to high.

Two vulnerabilities can be exploited independently of one another. Cisco fixed these vulnerabilities in firmware releases 1.0.03.22 and later. The company is not aware of any attacks in the wild exploiting these issues.

Back to the list