Skip to main content

Command Palette

Search for a command to run...

Vulnerabilities in DrayTek Routers Threaten Hundreds of Organizations

Updated
2 min read
Vulnerabilities in DrayTek Routers Threaten Hundreds of Organizations
T

Just a SOC Analyst ^^

According to a warning from Forescout, over 300 organizations have been attacked by ransomware groups using new vulnerabilities in DrayTek devices, including a previously undiscovered zero-day vulnerability.

Impact Level

In October, Forescout published a document detailing 14 security flaws in DrayTek Vigor routers that could affect hundreds of thousands of devices, many of which have not even been patched for vulnerabilities that appeared years ago.

After publishing the research, the company reported receiving information from Prodaft - a Threat Intelligence service provider - about an exploitation campaign targeting over 20,000 DrayTek devices to steal credentials and deploy ransomware.

At least three different attack groups participated in this campaign, from August to September 2023, involving the exploitation of zero-day vulnerabilities for initial access.

Roles and Objectives of Each Hacker Group

This campaign involves three separate hacker groups – Monstrous Mantis (Ragnar Locker), Ruthless Mantis (PTI-288), and LARVA-15 (Wazawaka) – who follow a specific workflow as shown in the image below:

Figure 1. Roles and objectives of each attack group

List of Exploited Vulnerabilities

This campaign is believed to exploit vulnerabilities in DrayTek routers to perform initial access, specifically targeting the mainfunction.cgi page of the WebUI. WebUI is a browser-based management interface used to configure DrayTek routers and is often publicly accessible on the internet, although the provider has advised restricting access to it.

DrayTek's web application has faced numerous security issues over the past four years with at least 18 vulnerabilities allowing Remote Code Execution (RCE). The list of CVEs includes:

  • CVE-2020-8515

  • CVE-2020-14472

  • CVE-2020-14993

  • CVE-2020-15415

  • CVE-2020-19664

  • CVE-2021-42911

  • CVE-2021-43118

  • CVE-2023-1162

  • CVE-2023-24229

Most of these flaws have the same root cause as previously discovered vulnerabilities and still affect DrayTek devices using software version 1.5.3. However, it is still unclear whether software version 1.5.6, the latest version for these devices, is vulnerable.

Recommendations

FPT Threat Intelligence recommends organizations and individuals take several measures to prevent this campaign:

  • Network Monitoring: Enhance network traffic monitoring to detect unusual activities.

  • Device Management: Ensure proper network device configuration, change default passwords, and promptly patch vulnerabilities.

  • Security Awareness: Train employees to recognize attack methods and suspicious behavior.

  • Network Segmentation: Separate network components to reduce the risk of spreading when attacked.

References

Newsletters-eng

Part 1 of 50

More from this blog

F

FPT IS Security

761 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.

Vulnerabilities in DrayTek Routers Threaten Hundreds of Organizations