CVE-2021-1297

Absolute Path Traversal (CWE-36)

Published: Feb 4, 2021 / Updated: 46mo ago

010
CVSS 7.5EPSS 0.45%High
CVE info copied to clipboard

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to conduct directory traversal attacks and overwrite certain files that should be restricted on an affected system. These vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by using the web-based management interface to upload a file to location on an affected device that they should not have access to. A successful exploit could allow the attacker to overwrite files on the file system of the affected device.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2021-1297. See article

Feb 3, 2021 at 4:06 PM / tools.cisco.com
Threat Intelligence Report

CVE-2021-1297 is a critical vulnerability in Cisco Small Business VPN Routers that allows an unauthenticated, remote attacker to conduct directory traversal attacks and overwrite restricted files on the affected system. As of now, there is no information on whether this vulnerability is being exploited in the wild or if there are proof-of-concept exploits available. It is recommended to apply any patches or mitigations provided by Cisco to prevent potential exploitation and downstream impacts to other third-party vendors using these routers. See article

Feb 8, 2021 at 6:03 PM
EPSS

EPSS Score was set to: 0.45% (Percentile: 72.1%)

Sep 15, 2023 at 9:03 AM
Static CVE Timeline Graph

Affected Systems

Cisco/rv260w_wireless-ac_vpn_router_firmware
+null more

Patches

tools.cisco.com
+null more

Attack Patterns

CAPEC-597: Absolute Path Traversal
+null more

News

Crucial Cisco Flaws Leads to RCE Attacks - TGlobal
Faults exist in the web-based management interface of the small-business lineup of Cisco’s VPN routers which includes its RV160, RV160W, RV260, RV260P and RV260W models. Flaws which are affected by improper validation of user-provided input to a router web-based interface can be exploited by attackers by sending fabricated HTTP requests to affected devices.
Новости информационной безопасности
Multiple critical security flaws have been reported in Cisco VPN routers for businesses that could allow unauthenticated, remote attackers to execute arbitrary code as the root user on the affected devices. Updates for RV016, RV042, RV082, RV320 and RV325 routers, fixing a bunch of vulnerabilities that allowed attacker to execute commands with root privileges, perform RCE and cause DoS.
Huge patches from vendors, Vulners news and hot Android malware
Multiple critical security flaws have been reported in Cisco VPN routers for businesses that could allow unauthenticated, remote attackers to execute arbitrary code as the root user on the affected devices. Vulnerabilities allowing remote attacker to execute arbitrary code in vCenter Server, cause heap overflow in OpenSLP service and thereby execute code remotely in ESXi have been fixed.
Huge patches from vendors, Vulners news and hot Android malware
Multiple critical security flaws have been reported in Cisco VPN routers for businesses that could allow unauthenticated, remote attackers to execute arbitrary code as the root user on the affected devices. Updates for RV016, RV042, RV082, RV320 and RV325 routers, fixing a bunch of vulnerabilities that allowed attacker to execute commands with root privileges, perform RCE and cause DoS.
Cisco RV160/RV160W/RV260/RV260P/RV260W Web-based Management Interface pathname traversal
A vulnerability was found in Cisco RV160, RV160W, RV260, RV260P and RV260W ( Router Operating System ). It has been rated as critical. This issue affects an unknown part of the component Web-based Management Interface . Upgrading eliminates this vulnerability.
See 2 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:High
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI