PatchSiren

PatchSiren cyber security CVE debrief

CVE-2021-20124 DrayTek CVE debrief

CVE-2021-20124 is a path traversal vulnerability affecting DrayTek VigorConnect. CISA added it to the Known Exploited Vulnerabilities (KEV) catalog on 2024-09-03 and set a remediation due date of 2024-09-24. Because it is on the KEV list, defenders should treat it as an urgent remediation item and follow vendor mitigation guidance or discontinue use if mitigations are not available.

Vendor
DrayTek
Product
VigorConnect
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2024-09-03
Original CVE updated
2024-09-03
Advisory published
2024-09-03
Advisory updated
2024-09-03

Who should care

Security, IT, and operations teams responsible for DrayTek VigorConnect deployments should prioritize this issue, especially anyone tracking CISA KEV items for patching and risk reduction.

Technical summary

The supplied official records identify CVE-2021-20124 as a path traversal vulnerability in DrayTek VigorConnect. CISA’s KEV entry lists the product as DrayTek VigorConnect and marks the vulnerability as known exploited, with required action to apply vendor mitigations or discontinue use if mitigations are unavailable.

Defensive priority

Urgent — CISA KEV listing indicates known exploitation and a short remediation window (due 2024-09-24).

Recommended defensive actions

  • Review the DrayTek security advisory referenced by CISA for mitigation guidance.
  • Apply any vendor-recommended mitigations for VigorConnect as soon as possible.
  • If mitigations are unavailable or cannot be applied, discontinue use of the product per CISA guidance.
  • Verify whether any VigorConnect instances remain deployed and inventory their exposure.
  • Track this CVE in vulnerability management and incident response workflows until remediation is complete.

Evidence notes

Evidence is limited to official records supplied in the corpus: the CISA KEV catalog entry, the CVE.org record, and the NVD detail page. The CISA KEV metadata states the vulnerability name as 'Draytek VigorConnect Path Traversal Vulnerability,' date added 2024-09-03, due date 2024-09-24, and required action to apply vendor mitigations or discontinue use if mitigations are unavailable.

Official resources

Publicly documented in CISA’s Known Exploited Vulnerabilities catalog on 2024-09-03.