On January 10th, Cisco confirmed an undocumented backdoor in several of their small business routers which “could allow an unauthenticated, remote attacker to gain root-level access to an affected device.The details:This vulnerability is due to an undocumented test interface in the TCP service listening on port 32764 of the affected device. An attacker could exploit this vulnerability by accessing the affected device from the LAN-side interface and issuing arbitrary commands in the underlying operating system. An exploit could allow the attacker to access user credentials for the administrator account of the device, and read the device configuration. The exploit can also allow the attacker to issue arbitrary commands on the device with escalated privileges.Cisco indicated that they will be releasing free updates for the affected product. I have to admit that I can’t help myself but to laugh when I read their official title for this one, “Undocumented Test Interface in Cisco Small Business Devices”. A test interface?Cute. The products in question are: Cisco RVS4000 4-port Gigabit Security Router running firmware version 2.0.3.2 and priorCisco WRVS4400N Wireless-N Gigabit Security Router hardware version 1.0 and 1.1 running firmware version 1.1.13 and priorCisco WRVS4400N Wireless-N Gigabit Security Router hardware version 2.0 running firmware version 2.0.2.1 and priorCisco WAP4410N Wireless-N Access Point running firmware version 2.0.6.1 and priorIt was interesting to note that Cisco was quick to point out that they had divested themselves of the Linksys line. Belkin took over the Linksys brand from Cisco in March 2013. For those of you wondering if there is affected versions in the Linksys line, Cisco advises that people reach out to Belkin directly via ‘security @ belkin.com’. I’d point readers to their security page directly but, for whatever reason I couldn’t find such an animal. I will go out on a limb and posit that this issue probably exists in some of the products that Belkin inherited. The significant downside to this announcement is that a wide swath of these devices will remain unpatched for the foreseeable future. These are typically deployed in smaller businesses that lack the proper IT related support to remedy the issue. So why might you ask am I writing about this now? Well, for the simple reason that this could potentially put hundreds of small businesses at risk by virtue of the fact that they will not have the aforementioned support. I’m concerned that this could still be an exposure that we will be able to find in a year from now. Hope springs nonetheless.[Update] It appears that this problem affects a little more than I first thought at first blush. Here is a link for more on this story (h/t SB) Related content news The end of the road By Dave Lewis May 30, 2017 3 mins Security news WannaCry...ransomware cyberattack as far as the eye can see By Dave Lewis May 15, 2017 4 mins Security news HITB Amsterdam: hackers, waffles and coffee oh my By Dave Lewis Apr 21, 2017 3 mins Security news Fail to patch and wait for the pain By Dave Lewis Apr 20, 2017 3 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe