
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN032
_____________________________________________________________________

DATE                : 19/01/2021

HARDWARE PLATFORM(S): Cisco Small Business RV110W, RV130, RV130W,
                                      RV215W Routers.

OPERATING SYSTEM(S):  Cisco Small Business RV110W, RV130, RV130W,
                                RV215W Routers'csoftware.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U
_____________________________________________________________________

Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote
Command Execution and Denial of Service Vulnerabilities

Critical


Advisory ID:        cisco-sa-rv-overflow-WUnUgv4U
First Published:    2021 January 13 16:00 GMT
Last Updated:       2021 January 19 16:21 GMT
Version 2.0:        Final
Workarounds:        No workarounds available
Cisco Bug IDs:      CSCvv65098
                    CSCvv69398
                    CSCvv71463
                    More...
CVSS Score:         Base 9.8

CVE-2021-1159
CVE-2021-1160
CVE-2021-1161
More...

CWE-121


Summary

    Multiple vulnerabilities in the Universal Plug and Play (UPnP)
service and the web-based management interface of Cisco Small Business
RV110W, RV130, RV130W, and RV215W Routers could allow a remote attacker
to execute arbitrary code or cause an affected device to restart
unexpectedly.

    For more information about these vulnerabilities, see the Details
section of this advisory.

    Cisco has not released software updates that address these
vulnerabilities. There are no workarounds that address these
vulnerabilities.

    This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U


Affected Products

    Vulnerable Products

    These vulnerabilities affect the following Cisco Small Business
routers:
        RV110W Wireless-N VPN Firewall
        RV130 VPN Router
        RV130W Wireless-N Multifunction VPN Router
        RV215W Wireless-N VPN Router

    The web-based management interface of these devices is available
through a local LAN connection, which cannot be disabled, or through the
WAN connection if the remote management feature is enabled. By default,
the remote management feature is disabled for these devices.


    Determine the Device Configuration

    To determine whether the remote management feature is enabled for a
device, open the web-based management interface and choose Basic
Settings > Remote Management. If the Enable box is checked, remote
management is enabled for the device.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this
advisory are known to be affected by these vulnerabilities.


Details

    The vulnerabilities are not dependent on one another. Exploitation
of one of the vulnerabilities is not required to exploit another
vulnerability. In addition, a software release that is affected by one
of the vulnerabilities may not be affected by the other vulnerabilities.


    Details about the vulnerabilities are as follows.

    Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers UPnP
Remote Command Execution and Denial of Service Vulnerability

    A vulnerability in the Universal Plug and Play (UPnP) service of
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could
allow an unauthenticated, remote attacker to execute arbitrary code or
cause an affected device to restart unexpectedly.

    The vulnerability is due to improper validation of incoming UPnP
traffic. An attacker could exploit this vulnerability by sending a
crafted UPnP request to an affected device. A successful exploit could
allow the attacker to execute arbitrary code as the root user on the
underlying operating system or cause the device to reload, resulting in
a denial of service (DoS) condition.

    Cisco has not released software updates that address this
vulnerability. There are no workarounds that address this vulnerability.

    Bug ID(s): CSCvv79107, CSCvv79109, and CSCvv79110
    CVE ID: CVE-2021-1164
    Security Impact Rating (SIR): Critical
    CVSS Base Score: 9.8
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers
Management Interface Remote Command Execution and Denial of Service
Vulnerabilities

    Multiple vulnerabilities in the web-based management interface of
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could
allow an authenticated, remote attacker with valid administrator
credentials to execute arbitrary code or cause an affected device to
restart unexpectedly.

    The vulnerabilities are due to improper validation of user-supplied
input in the web-based management interface. An attacker could exploit
these vulnerabilities by sending crafted HTTP requests to an affected
device. A successful exploit could allow the attacker to execute
arbitrary code as the root user on the underlying operating system or
cause the device to reload, resulting in a denial of service (DoS)
condition. To exploit these vulnerabilities, an attacker would need to
have valid administrator credentials on the affected device.

    Cisco has not released software updates that address these
vulnerabilities. There are no workarounds that address these
vulnerabilities.

    Bug ID(s): CSCvv96742, CSCvv96741, CSCvv96738, CSCvv96733,
CSCvv96732, CSCvv96729, CSCvv96730, CSCvw10473, CSCvw10487, CSCvw10484,
CSCvw04678, CSCvw04779, CSCvw04781, CSCvv96765, CSCvv96767, CSCvv96764,
CSCvv96756, CSCvv96755, CSCvv96751, CSCvv96748, CSCvv96747, CSCvv96772,
CSCvv96771, CSCvv96768, CSCvv96763, CSCvv96762, CSCvv96761, CSCvv96757,
CSCvv96820, CSCvv96758, CSCvv96759, CSCvv96812, CSCvv96814, CSCvv96811,
CSCvv96810, CSCvv96809, CSCvv96806, CSCvv96799, CSCvv96800, CSCvv96801,
CSCvv96807, CSCvw06978, CSCvw06865, CSCvw06971, CSCvw06860, CSCvw06967,
CSCvw06852, CSCvw06962, CSCvw06846, CSCvw06841, CSCvw06961, CSCvw06832,
CSCvw06958, CSCvv96817, CSCvv96818, CSCvw06813, CSCvw06902, CSCvw06828,
CSCvw06950, CSCvv71466, CSCvv71463, CSCvv69398, CSCvw49030, CSCvw49036,
CSCvw49034, CSCvv71467, CSCvv71468, CSCvv65098, CSCvw07002, CSCvw06900,
CSCvw06998, CSCvw06894, CSCvw06993, CSCvw06882, CSCvw06868, CSCvw06981,
CSCvw06873, CSCvw06982, CSCvw06987, CSCvw06874, CSCvw06879, CSCvw06991,
CSCvw06880, CSCvw06992, CSCvw76488, and CSCvw91642

    CVE ID(s): CVE-2021-1209, CVE-2021-1207, CVE-2021-1167,
CVE-2021-1208, CVE-2021-1360, CVE-2021-1168, CVE-2021-1204,
CVE-2021-1173, CVE-2021-1187, CVE-2021-1161, CVE-2021-1198,
CVE-2021-1182, CVE-2021-1211, CVE-2021-1163, CVE-2021-1171,
CVE-2021-1188, CVE-2021-1189, CVE-2021-1159, CVE-2021-1192,
CVE-2021-1184, CVE-2021-1216, CVE-2021-1177, CVE-2021-1210,
CVE-2021-1170, CVE-2021-1174, CVE-2021-1200, CVE-2021-1195,
CVE-2021-1215, CVE-2021-1205, CVE-2021-1201, CVE-2021-1196,
CVE-2021-1175, CVE-2021-1179, CVE-2021-1191, CVE-2021-1169,
CVE-2021-1307, CVE-2021-1212, CVE-2021-1180, CVE-2021-1190,
CVE-2021-1185, CVE-2021-1176, CVE-2021-1172, CVE-2021-1183,
CVE-2021-1166, CVE-2021-1194, CVE-2021-1203, CVE-2021-1206,
CVE-2021-1178, CVE-2021-1214, CVE-2021-1217, CVE-2021-1186,
CVE-2021-1165, CVE-2021-1197, CVE-2021-1160, CVE-2021-1181,
CVE-2021-1162, CVE-2021-1199, CVE-2021-1213, CVE-2021-1193,
and CVE-2021-1202

    Security Impact Rating (SIR): High
    CVSS Base Score: 7.2
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H


Workarounds

    There are no workarounds that address these vulnerabilities.


Fixed Software

    Cisco has not released and will not release software updates to
address the vulnerabilities described in this advisory. The Cisco Small
Business RV110W, RV130, RV130W, and RV215W Routers have entered the end-
of-life process. Customers are advised to refer to the end-of-life
notices for these products:

    End-of-Sale and End-of-Life Announcement for the Cisco Small
Business RV Series Routers (selected models)

    Customers are encouraged to migrate to the Cisco Small Business
RV132W, RV160, or RV160W Routers.

    When considering a device migration, customers are advised to
regularly consult the advisories for Cisco products, which are available
from the Cisco Security Advisories and Alerts page, to determine
exposure and a complete upgrade solution.

    In all cases, customers should ensure that new device will be
sufficient for their network needs; new devices contain sufficient
memory, and current hardware and software configurations will continue
to be supported properly by the new product. If the information is not
clear, customers are advised to contact the Cisco Technical Assistance
Center (TAC) or their contracted maintenance providers.


Exploitation and Public Announcements

    The Cisco Product Security Incident Response Team (PSIRT) is not
aware of any public announcements or malicious use of the
vulnerabilities described in this advisory.


Source

    Cisco would like to thank the following people for reporting these
vulnerabilities:

        ADLab of Venustech: CVE-2021-1168, CVE-2021-1197, CVE-2021-1198,
CVE-2021-1199, CVE-2021-1200, CVE-2021-1201, CVE-2021-1202,
CVE-2021-1205, CVE-2021-1206, CVE-2021-1210, CVE-2021-1211,
CVE-2021-1212, CVE-2021-1213, CVE-2021-1214, CVE-2021-1215,
CVE-2021-1216, and CVE-2021-1217

        Kai Cheng of the Institute of Information Engineering, Chinese
Academy of Sciences: CVE-2021-1159, CVE-2021-1160, CVE-2021-1161,
CVE-2021-1162, CVE-2021-1163, CVE-2021-1165, CVE-2021-1166,
CVE-2021-1169, CVE-2021-1170, CVE-2021-1171, CVE-2021-1172,
CVE-2021-1173, CVE-2021-1174, CVE-2021-1175, CVE-2021-1176,
CVE-2021-1177, CVE-2021-1178, CVE-2021-1179, CVE-2021-1180,
CVE-2021-1181, CVE-2021-1182, CVE-2021-1183, CVE-2021-1184,
CVE-2021-1185, CVE-2021-1186, CVE-2021-1187, CVE-2021-1188,
CVE-2021-1189, CVE-2021-1190, CVE-2021-1191, CVE-2021-1192,
CVE-2021-1193, CVE-2021-1194, CVE-2021-1195, CVE-2021-1196,
CVE-2021-1203, and CVE-2021-1204

        Shizhi He of Wuhan University: CVE-2021-1167 and CVE-2021-1208

        Simp1e of 1AQ Team: CVE-2021-1207, CVE-2021-1209, and
CVE-2021-1307

        Swings of Chaitin Security Research Lab: CVE-2021-1207,
CVE-2021-1209, CVE-2021-1164, and CVE-2021-1307

        Treck Zhou and Ares. Pan: CVE-2021-1164 and CVE-2021-1360


URL


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U


Revision History

Version 	Description 	Section 	Status 	Date

2.0 	Changed advisory SIR from High to Critical. Updated the advisory
title. Added a Details section. Changed the description and updated the
CVSS score and SIR for CVE-2021-1164. 	Title, Header (SIR and CVSS
score), Summary, and Details 	Final 	2021-JAN-19

    1.1 	Updated external researcher information. 	Source 	Final
2021-JAN-14

1.0 	Initial public release. 	— 	Final 	2021-JAN-13



Legal Disclaimer

    THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT
YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that
omits the distribution URL is an uncontrolled copy and may lack
important information or contain factual errors. The information in this
document is intended for end users of Cisco products.



=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================


