• Cisco fixes security flaw that could have allowed sneaky hacking

    From TechnologyDaily@1337:1/100 to All on Fri Feb 3 19:30:03 2023
    Cisco fixes security flaw that could have allowed sneaky hacking

    Date:
    Fri, 03 Feb 2023 19:28:59 +0000

    Description:
    A fix for the Cisco IOx is already available, so patch now.

    FULL STORY ======================================================================

    Cisco has confirmed it patched a high-severity flaw that was impacting its
    IOx application hosting environment.

    Cisco IOx is an application environment that allows consistent deployment of applications that are independent of the network infrastructure and docker tooling for development. It is used by a wide range of businesses, from manufacturing, to energy, to the public sector.

    The flaw, tracked as CVE-2023-20076, allowed threat actors to achieve persistence on the operating system, thus gaining the ability to execute commands, remotely. Who is affected?

    "An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file," Cisco said in its security advisory.

    Users running IOS XE without native docker support are affected, as well as those running 800 Series Industrial ISR routers, CGR1000 compute modules, IC3000 industrial compute gateways, IR510 WPAN industrial routers, and Cisco Catalyst access point (COS-APs) endpoints .

    Catalyst 9000 Series switches, IOS XR and NX-OS software, and Meraki
    products, are unaffected by the flaw, the company added. Read more

    Cisco says it won't patch these dangerous VPN security flaws in its SMB
    routers


    Cisco AnyConnect urges admins to update now to avoid security threats


    Check out the best firewalls right now

    The caveat with this vulnerability is that the threat actors need to already be authenticated as an administrator on the vulnerable systems.

    Still, researchers from Trellix, who first discovered the flaw, said crooks could easily pair this vulnerability with others, in their malicious campaigns. Authentication can be obtained with default login credentials
    (many users never change them), as well as through phishing and social engineering.

    After authenticating, CVE-2023-20076 can be abused for "unrestricted access, allowing malicious code to lurk in the system and persist across reboots and firmware upgrades."

    "Side-stepping this security measure means that if an attacker exploits this vulnerability, the malicious package will keep running until the device is factory reset or until it is manually deleted."

    The good news is that so far there is no evidence of the flaw being exploited in the wild but still, if you use this solution, make sure it's updated to
    the latest version. These are the best privacy tools right now

    Via: BleepingComputer



    ======================================================================
    Link to news story: https://www.techradar.com/news/cisco-fixes-security-flaw-that-could-have-allow ed-sneaky-hacking


    --- Mystic BBS v1.12 A47 (Linux/64)
    * Origin: tqwNet Technology News (1337:1/100)