CVE-2021-1609

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to execute arbitrary commands or code on affected Cisco Small Business VPN routers through the web management interface. It affects RV340, RV340W, RV345, and RV345P routers running vulnerable firmware versions. Attackers can achieve full system compromise without authentication.

💻 Affected Systems

Products:
  • Cisco RV340
  • Cisco RV340W
  • Cisco RV345
  • Cisco RV345P
Versions: Firmware versions earlier than 1.0.03.24
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Web management interface is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router takeover allowing attacker to intercept all network traffic, install persistent backdoors, pivot to internal networks, and cause permanent device damage.

🟠

Likely Case

Router compromise leading to network traffic interception, credential theft, installation of malware, and denial of service.

🟢

If Mitigated

Limited impact if routers are behind firewalls with strict access controls, though internal attackers could still exploit.

🌐 Internet-Facing: HIGH - Web management interface is typically exposed and vulnerability requires no authentication.
🏢 Internal Only: HIGH - Even internally, attackers can exploit without credentials to compromise the router.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploits exist. Attack requires only network access to the web interface port (typically 443).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.03.24 and later

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy

Restart Required: Yes

Instructions:

1. Download firmware 1.0.03.24 or later from Cisco website. 2. Log into router web interface. 3. Navigate to Administration > Firmware Upgrade. 4. Upload new firmware file. 5. Wait for upgrade to complete and router to reboot.

🔧 Temporary Workarounds

Disable web management interface

all

Disable the vulnerable web interface completely

Configure via CLI: no ip http server
no ip http secure-server

Restrict web interface access

all

Limit web interface access to trusted IP addresses only

Configure via web interface: Firewall > ACL > Add rule to block port 443/tcp from untrusted networks

🧯 If You Can't Patch

  • Immediately disable web management interface or restrict access to trusted management networks only
  • Implement network segmentation to isolate routers from critical internal networks

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System Summary > Firmware Version. If version is earlier than 1.0.03.24, device is vulnerable.

Check Version:

Via CLI: show version | include Version

Verify Fix Applied:

Verify firmware version is 1.0.03.24 or later. Test web interface functionality to ensure it still works properly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual web interface access from unexpected IPs
  • Multiple failed login attempts followed by successful access
  • Configuration changes from unknown sources

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting command execution
  • Port scanning originating from router

SIEM Query:

source="router_logs" AND ("webui" OR "https") AND (status="200" OR "POST") AND src_ip NOT IN [trusted_management_ips]

🔗 References

📤 Share & Export