In order to address vulnerabilities in some devices, Cisco Systems released new firmware versions for some of its small business routers and wireless LAN controllers that could allow remote attackers to compromise the vulnerable products.
A vulnerability found in the web management interface of the Cisco RV110W Wireless-N VPN Firewall, RV215W Wireless-N VPN Router and CVR100W Wireless-N VPN Router could end up exploited by an unauthenticated, remote attacker to gain administrative access to the affected devices.
“The vulnerability is due to improper handling of authentication requests by the web framework,” Cisco said in a security advisory. “An attacker could exploit this vulnerability by intercepting, modifying and resubmitting an authentication request. Successful exploitation of this vulnerability could give an attacker administrative-level access to the web-based administration interface on the affected device.”
Cisco assigned an impact score of 10 to the vulnerability — the highest in the Common Vulnerability Scoring System (CVSS).
Users should update the firmware of the affected devices because there are no available workarounds. The patched firmware versions are: Cisco CVR100W Wireless-N VPN Router firmware version 126.96.36.199, Cisco RV110W Wireless-N VPN Firewall firmware version 188.8.131.52 and Cisco RV215W Wireless-N VPN Router firmware version 184.108.40.206.
Cisco also fixed five denial-of-service vulnerabilities and one unauthorized access vulnerability in the software running on a wide range of its stand-alone and modular wireless LAN controllers. The affected products are: Cisco 500 Series Wireless Express Mobility Controllers, Cisco 2000 Series Wireless LAN Controllers, Cisco 2100 Series Wireless LAN Controllers, Cisco 2500 Series Wireless Controllers, Cisco 4100 Series Wireless LAN Controllers, Cisco 4400 Series Wireless LAN Controllers, Cisco 5500 Series Wireless Controllers, Cisco Flex 7500 Series Wireless Controllers, Cisco 8500 Series Wireless Controllers, Cisco Virtual Wireless Controller, Cisco Catalyst 6500 Series/7600 Series Wireless Services Module (Cisco WiSM), Cisco Wireless Services Module version 2 (WiSM2), Cisco NME-AIR-WLC Module for Integrated Services Routers (ISRs), Cisco NM-AIR-WLC Module for Integrated Services Routers (ISRs), Cisco Catalyst 3750G Integrated WLC and Cisco Wireless Controller Software for Services-Ready Engine (SRE).
The denial-of-service vulnerabilities can end up exploited by sending specially crafted IGMP version 3 messages, MLD version 2 packets, Ethernet 802.11 frames and WebAuth login requests to the affected devices. The attacks can force the affected devices to restart or can result in more persistent denial-of-service conditions, depending on the vulnerability being exploited.
The unauthorized access vulnerability is within code that Cisco wireless LAN controllers send to other access point devices connected to them.
“An attacker could exploit this vulnerability by attempting to authenticate to an affected device using locally-stored credentials of the AP,” Cisco said. “A successful attack could allow an attacker to take complete control of the affected AP and make arbitrary changes to the configuration.”