The popular network equipment company has released patches in recent days to fix vulnerabilities in a variety of its product range. Such vulnerabilities could have been used to execute code remotely.
Among all vulnerabilities, The most serious was CVE-2021-1609, assuming a potential backdoor to execute arbitrary code by an unauthenticated attacker or causing a denial of service condition (Two) through the mass sending of HTTP requests. The models affected by this vulnerability are Cisco RV340, RV340W, RV345 and RV345P.
Another similar vulnerability, identified with the name CVE-2021-1610, which reports the possibility of allowing the injection of arbitrary commands with root privileges. This vulnerability is caused by a flaw in the web interface to operate the device and its exploitation is similar to the previous vulnerability. In the latter case, affected models are RV160 and RV260 series.
On the other hand, Cisco also reports vulnerabilities in Cisco Packet Tracer software and a privilege escalation vulnerability in the device CLI interface. Such vulnerabilities could allow a DDL injection attack and arbitrary command execution, respectively. In both cases, Attacks could be executed by a local attacker.
The company strongly recommends updating all those devices, through the updates that are already published on the official website of the company.
Fountain: Hispasec
Image: Technology Photo created by victor217 – www.freepik.es
