Monday, January 27, 2025
HomeComputer SecurityHackers Exploiting More than 9000 Cisco RV320/RV325 Routers After POC published in...

Hackers Exploiting More than 9000 Cisco RV320/RV325 Routers After POC published in GitHub

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals now actively exploiting 9,852 Cisco RV320/RV325 routers that are vulnerable to critical remote code execution vulnerabilities CVE-2019-1653, CVE-2019-1652.

A vulnerability in the Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information from CVE-2019-1653, and a remote attacker with administrative privileges on an affected device to execute an arbitrary command using CVE-2019-1652.

Researchers scanned almost 15,309 unique IPv4 hosts and discovered that 9,657 Cisco RV320/RV325 routers are vulnerable to CVE-2019-1653.

According to Bad packets research, 6,247 out of 9,852 scanned Cisco RV320 routers scanned are vulnerable and 3,410 out of 5,457 Cisco RV325 routers scanned are vulnerable.

There are many vulnerable hosts found in more than 122 countries on the network of 1,619 unique internet service providers and U.S having more number of vulnerable hosts.

Very recently Security researcher David Davidson published a proof-of-concept exploit in GitHub for these Cisco vulnerabilities that can able to perfrom command injection the info disclosure.

cybercriminals taking advantage of this exploit and actively exploiting the vulnerable Cisco RV320/RV325 routers. Cisco released updates a firmware 1.4.2.15 and 1.4.2.17 for affect Cisco RV320/RV325 routers.

In this case Cisco Urged to apply the patch immediately by anyone using outdated firmware and also Changing the device’s admin and WiFi credentials is also highly recommended as they may already be compromised. 

Due to the sensitive nature of these vulnerabilities, the IP addresses of the affected Cisco RV320/RV325 routers will not be published publicly, Researchers said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...