SPI Firewall, Content Filtering, NAT support, Static NAT, Policy NAT, IPv4/IPv6 access rules, PAT support, DoS attack prevention, Port Mirroring, IPv6 support, VPN passthrough, Domain Blocking, 802.1x, LDAP, Active Directory, RADIUS, QoS, DHCP server, Port Forwarding, Port Triggering, DHCP client, PnP deployment, Automatic Updates, Syslog, USB 3G/4G WAN failover Site-to-Site IPSec VPN: 50 (any combination of site-to-site and remote access)Ĭlient-to-site IPSec VPN: 50 (any combination of site-to-site and remote access)ĭynamic Routing (RIPv1/v2, RIPng), Inter-VLAN Routing, IGMP Proxy, Static Routing The latest version has just been released last January, and there's no other way around it.SSL (Cisco An圜onnect) VPN throughput: 33Mbps PPTP trhroughput: 100 Mbps
Cisco Advises to Upgrade to 1.0.01.02 Firmare or Later to Resolve Security FlawsĬisco has revealed in a statement t hat users need to update to the latest firmware as those that are still running on a firmware earlier than 1.0.01.02 are the most prone to the attack. Moreover, multiple command injection vulnerabilities are also sourced which have been identified as CVE-2021-1314, CVE-2021-1315, and CVE-2021-1316. However, an attacker would need to key in correct administrator essentials to exploit the vulnerability. This is yet another validation problem that will allow HTTP requests to access the device.
Read more: Cisco's WAN Aims a More Secure Cloud Adoption In Company's 5G Integration to Catalyst 8000 EdgeĪside from being remotely exploitable, the bugs can also cause a service denial. A successful exploit could allow the attacker to overwrite files on the file system of the affected device." Using this, attackers could access Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers even remotely.Īccording to a warning statement made by Cisco,"An attacker could exploit these vulnerabilities by using the web-based management interface to upload a file to a location on an affected device that they should not have access to. They could also access via a directory traversal issue. The Hacker News reports that attackers could not only focus on web interface bugs and incapability to validate HTTP requests. As of the moment Cisco is monitoring bugs in the security issue as CVE-2021-1289, CVE-2021-1290, and CVE-2021-1291. Consequently, attackers can easily craft their own HTTP requests in order to exploit the device. The vulnerability of the device comes from its incapability to properly validate the HTTP requests.
Web Management Interface Bugs Allow Root User to Execute Code and Gain Root Level AccessĪpparently, the routers had several bugs that attackers can use through coding in order to gain root level access to the web management interface. Such devices are currently in use as these were the same models that Cisco recommended to users to upgrade to in the previous months.
The list of Small Business VPN routers that are included in these critical flaws include Cisco Small Business RV160, RV160W, RV260, RV260P, as well as the RV260W VPN. The company is currently advising users to upgrade to the latest firmware to fix flaws and to provide more security for their devices. (Photo : Screenshot Youtube Video by Iliya Gatsev)