Arcadyan Router Exploitations
Detects exploitation of vulnerabilities in Arcadyan routers as reported in CVE-2021-20090 and CVE-2021-20091.
Sigma rule (View on GitHub)
1title: Arcadyan Router Exploitations
2id: f0500377-bc70-425d-ac8c-e956cd906871
3status: test
4description: Detects exploitation of vulnerabilities in Arcadyan routers as reported in CVE-2021-20090 and CVE-2021-20091.
5references:
6 - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2
7 - https://www.tenable.com/security/research/tra-2021-13
8 - https://blogs.juniper.net/en-us/security/freshly-disclosed-vulnerability-cve-2021-20090-exploited-in-the-wild
9author: Bhabesh Raj
10date: 2021-08-24
11modified: 2023-01-02
12tags:
13 - attack.initial-access
14 - attack.t1190
15 - cve.2021-20090
16 - cve.2021-20091
17 - detection.emerging-threats
18logsource:
19 category: webserver
20detection:
21 path_traversal:
22 # CVE-2021-20090 (Bypass Auth: Path Traversal)
23 cs-uri-query|contains: '..%2f'
24 config_file_inj:
25 cs-uri-query|contains|all:
26 # Chaining of CVE-2021-20090 (Bypass Auth) and CVE-2021-20091 (Config File Injection)
27 - '..%2f'
28 - 'apply_abstract.cgi'
29 noauth_list:
30 cs-uri-query|contains:
31 - '/images/'
32 - '/js/'
33 - '/css/'
34 - '/setup_top_login.htm'
35 - '/login.html'
36 - '/loginerror.html'
37 - '/loginexclude.html'
38 - '/loginlock.html'
39 condition: (path_traversal or config_file_inj) and noauth_list
40falsepositives:
41 - Unknown
42level: critical
References
Related rules
- ADSelfService Exploitation
- Apache Spark Shell Command Injection - Weblogs
- Atlassian Bitbucket Command Injection Via Archive API
- CVE-2010-5278 Exploitation Attempt
- CVE-2020-0688 Exchange Exploitation via Web Log