A security vulnerability, which affects the DrayTek Vigor range of routers, has been identified.
The vulnerability (CVE-2022-32548) affects a number of Vigor models that Exa and our customers have deployed in the past few years, specifically the following devices:
- Vigor 2862 router
- Vigor 2865 router
- Vigor 2866 router
- If you have enabled SSL VPN your device is open to attack
- If you have enabled remote management of the Vigor, without specifying a management IP range, you are vulnerable to attack. This leaves your device open for any IP to access management settings
On a standard out-of-the-box configuration, or Exa’s default managed configuration, management pages can’t be reached through Wide Area Network (WAN) interfaces. However, this doesn’t protect malicious activity within the Local Area Network (LAN). As such, any Vigor running vulnerable firmware can be exploited within the LAN.
What can I do?
Draytek has released firmware updates to patch the vulnerability, so if you are managing your device internally, we recommend updating your firmware immediately. Before doing the upgrade, take a backup of your current config in case you need it later.
Anyone using SSL VPN should immediately disable this feature to remove access to the web interface from the internet, until a firmware update is applied. Once this update has been applied, customers should be able to switch the SSL VPN on again.
You should also review whether remote access to the device management pages is needed. If it is, this should always (as best practice) be locked down to a limited number of management IP addresses/ranges.
You don’t need to take any action if we are managing your device, you will be contacted directly.
If you would like us to manage the deployment of firmware upgrades for you, whilst also gaining the security of a replacement router should anything happen, you can get in touch with us about our RFL (Router for Life) service.
For more information regarding vulnerability (CVE-2022-32548) visit the Draytek website.
