CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a command injection vulnerability (CVE-2023-20118) that poses significant risks to users of Cisco Small Business RV Series Routers, which are now considered end-of-life. This vulnerability, rated with a CVSSv3.1 score of 6.5, allows authenticated attackers to execute arbitrary commands with root privileges, potentially jeopardizing entire networks.

Vulnerability Details and Exploitation

The vulnerability arises from inadequate validation of user-supplied HTTP input within the routers’ web-based management interface. Attackers possessing valid administrative credentials can exploit this flaw by crafting malicious HTTP requests that bypass existing security measures, enabling them to inject commands and gain unauthorized access to sensitive information or disrupt services. Cisco has confirmed that the affected models include RV016, RV042, RV042G, RV082, RV320, and RV325, specifically those running firmware versions released prior to April 2023. Importantly, the company has stated that no patches will be provided, as these devices have reached their end-of-life status.

CISA’s advisory mandates that federal agencies either implement mitigations or cease using the affected routers by March 24, 2025, in accordance with Binding Operational Directive (BOD) 22-01. Private organizations are similarly encouraged to prioritize remediation efforts, especially in light of recent observations by French cybersecurity firm Sekoia, which noted exploitation attempts linked to the PolarEdge botnet campaign. This campaign seeks to incorporate vulnerable routers into distributed denial-of-service (DDoS) networks or use them as gateways for lateral movement within networks.

Risks and Mitigation Challenges

The lack of vendor-supplied patches presents a formidable challenge for mitigation. Administrators are advised to take immediate action by:

  1. Restricting administrative access to the routers’ management interfaces without delay.
  2. Monitoring logs for any unusual HTTP activity, particularly unauthorized command execution attempts.
  3. Considering the decommissioning of affected devices in favor of more secure, supported models.

CISA has underscored that the continued use of unpatched routers presents “significant risks to critical infrastructure,” particularly given their widespread deployment in small business and remote work settings. The agency’s alert comes on the heels of reports from the Shadowserver Foundation, which indicate a rise in exploitation attempts since August 2024, although the full extent of these activities remains uncertain. This situation serves as a poignant reminder of the risks associated with relying on outdated hardware within enterprise networks. With Cisco’s RV Series routers having been in use since the early 2010s, many organizations now face pressing decisions regarding hardware upgrades.

Cybersecurity experts caution that procrastination in addressing this vulnerability could lead to severe consequences, including ransomware attacks, data breaches, or operational disruptions. As threat actors increasingly target legacy systems, CISA’s advisory serves as a crucial reminder for organizations to align their vulnerability management strategies with the evolving threat landscape. For the time being, network administrators must carefully consider the financial implications of investing in new infrastructure against the escalating risks of maintaining vulnerable devices.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Winsage
CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw