Cisco routers suffer from several top-severity security bugs

Cisco routers suffer from several top-severity security bugs

5 critical vulnerabilities have been discovered affecting 4 widely used Cisco router families. 3 of the 5 are rated 10/10 on the Common Vulnerability Scoring System, meaning they could be forcefully exploited for the most damaging activities.

The log claims that Cisco itself discovered the critical bugs, releasing fixes for only 2 families of routers, while fixes for the other 2 are still pending. The dates in which the remaining patches could be free were ignored at the time of publication.

Routers affected by the failures are typically used by small businesses and also include the RV160, RV260, RV340 and RV345 models.

privilege escalation

Occasions for malicious actors to exploit these flaws include arbitrary code and command execution, elevation of privilege, execution of unsigned software, authentication bypass, and device spoofing in a botnet for Distributed Denial of Service (DDoS) attacks. .

Discovered vulnerabilities include:

CVE-two thousand twenty-two-twenty six hundred ninety-nine

CVE-two thousand twenty-two-twenty seven hundred

CVE-two thousand twenty-two-seven hundred one

CVE-two thousand twenty-two-seven hundred two

CVE-two thousand twenty-two-seven hundred eight

So far, RV340 and RV345 have been patched, while RV160 and RV260 still don't have their code.

To make matters worse, Cisco claimed that term testing exploit code is already free for certain of the disclosed vulnerabilities. This is particularly alarming as many small businesses do not have their technical support, which means these routers can go for months or even years without being repaired.

Following the news, Tenable's cybersecurity specialists turned to Shodan to scan the Internet for fragile routers and found more than XNUMX compromised devices. The good news is that no exploit has appeared in a public repository so far.

Cisco also stated that there is no workaround for these issues and that installing the patch will be the only way to protect the device and the network it supports from malicious actors.

Via: The Registry