Security News > 2021 > August > Cisco fixes critical, high severity pre-auth flaws in VPN routers
Cisco has addressed pre-auth security vulnerabilities impacting multiple Small Business VPN routers and allowing remote attackers to trigger a denial of service condition or execute commands and arbitrary code on vulnerable devices.
Luckily, as the company explains, the remote management feature is disabled by default on all affected VPN router models.
"The web-based management interface for these devices is available through local LAN connections by default and cannot be disabled there," Cisco says.
In August 2020, Cisco warned of actively exploited zero-day bugs in carrier-grade IOS XR routers with multicast routing enabled.
One month later, in October 2020, Cisco again warned of attacks actively targeting a separate high severity vulnerability impacting the IOS XR Network OS deployed on the same router models.
In July 2020, Cisco fixed another actively exploited ASA/FTD firewall bug and a pre-auth critical remote code execution flaw that could lead to full device takeover on vulnerable devices.
News URL
Related news
- DrayTek fixed critical flaws in over 700,000 exposed routers (source)
- CISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches (source)
- Cisco fixes VPN DoS flaw discovered in password spray attacks (source)
- New Cisco ASA and FTD features block VPN brute-force password attacks (source)
- Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems (source)
- Critical vulnerability in Cisco industrial wireless access points fixed (CVE-2024-20418) (source)
- Cisco scores a perfect CVSS 10 with critical flaw in its wireless system (source)
- D-Link urges users to retire VPN routers impacted by unfixed RCE flaw (source)
- D-Link tells users to trash old VPN routers over bug too dangerous to identify (source)