Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Questions Remain Over Attacks Causing DrayTek Router Reboots

DrayTek has shared some clarifications regarding the recent attacks causing router reboots, but some questions remain unanswered. 

Router vulnerabilities

Taiwan-based networking equipment manufacturer DrayTek has shared some clarifications regarding the recent router reboots reported by customers around the world, but some questions remain unanswered.

In late March, DrayTek router users in the UK, Australia and other countries started reporting that their devices had been constantly rebooting, causing connectivity issues. When the first reports emerged, the vendor suggested that the exploitation of a vulnerability may be involved, but did not share any information on which flaw may be responsible. 

In response to the increasing number of reports, DrayTek published a second advisory clarifying that the incidents appear to mainly involve older router models running outdated firmware. 

“Our investigation has determined that DrayTek Routers were targeted to repeated, suspicious, and potentially malicious TCP connection attempts originating from IP addresses with known bad reputations,” DrayTek explained. “These attempts could trigger the router to reboot in unpatched devices if those devices have SSL VPN Enabled, or Remote Management enabled without the protection of an Access Control List (ACL).”

The company has listed several Vigor router models that appear to have been impacted, but noted that firmware updates released for them in 2020 should patch the “issue”, for which exploitation in the wild is now being seen for the first time. 

However, it’s still unclear exactly which vulnerability — or vulnerabilities — has been exploited. In addition, it’s unclear what the attackers’ goal is and whether the device reboots are an intended outcome or an effect of failed exploitation attempts.

On the social media platform X, DrayTek said on March 26 that the issue appears to be related to a vulnerability disclosed in early March, but did not say exactly which flaw.

The vendor published two security advisories in early March: one describes half a dozen Vigor router vulnerabilities allowing DoS attacks, information disclosure, and code execution; and the second describes two code execution vulnerabilities. In both advisories, the company indicated that the firmware patches addressing these flaws had been available since the fall of 2024.

Advertisement. Scroll to continue reading.

Threat intelligence firm GreyNoise has published a blog post describing the exploitation attempts it has seen in recent days against DrayTek routers. Three flaws have been exploited, including CVE-2020-8515, CVE-2021-20123 and CVE-2021-20124, but the company could not confirm whether any of them are involved in the recent attacks.

DrayTek notified SecurityWeek when its second advisory was published, but did not respond to follow-up emails seeking clarifications. 

Related: DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global Campaign

Related: Unpatched Edimax Camera Flaw Exploited Since at Least May 2024

Related: Four-Faith Industrial Router Vulnerability Exploited in Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.