City
Epaper

42K Cisco devices compromised after hackers exploit critical bug, firm acts

By IANS | Updated: October 20, 2023 12:25 IST

San Francisco, Oct 20 Cyber criminals have exploited an unpatched and critical zero-day vulnerability in Cisco’s networking software ...

Open in App

San Francisco, Oct 20 Cyber criminals have exploited an unpatched and critical zero-day vulnerability in Cisco’s networking software to compromise tens of thousands of devices.

Censys, a search engine for Internet-connected devices and assets, observed nearly 42,000 compromised Cisco devices, noting a “sharp increase” in infections.

Networking giant Cisco admitted that an active exploitation of a previously unknown vulnerability in the Web User Interface (Web UI) feature in one of its software when exposed to the Internet or untrusted networks.

“This affects both physical and virtual devices running Cisco IOS XE software that also have the HTTP or HTTPS Server feature enabled,” the company said in a security update.

Successful exploitation of this vulnerability allows an attacker to create an account on the affected device with “privilege level 15” access, effectively granting them full control of the compromised device and allowing possible subsequent unauthorised activity, the company warned.

The list of devices running Cisco IOS XE software includes enterprise switches, wireless controllers, access points and industrial routers.

Cisco has recommended companies to disable the HTTP server feature on internet-facing systems.

In its analysis, Censys said the majority of compromised devices are located in the US, followed by the Philippines and Mexico.

“The primary targets of this vulnerability are not large corporations but smaller entities and individuals who are more susceptible,” security researchers said.

Cisco said that the new vulnerability received the highest Common Vulnerability Scoring System (CVSS) score (10/critical).

“Successful exploitation would grant an attacker full administrator privileges, allowing them to effectively take full control of the affected router and allowing possible subsequent unauthorized activity,” the company said.

Organisations should look for unexplained or newly created users on devices as evidence of potentially malicious activity relating to this threat.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Open in App

Related Stories

InternationalDeveloped Countries must reach net-zero far earlier and deliver climate finance in trillions, not billions: Bhupender Yadav

International"No one is above law": Bangladesh Chief Advisor on Sheikh Hasina's death sentence

International"Pre-determined verdict": Awami League leader slams 'Illegal, unconstitutional' Yunus govt on Sheikh Hasina's death sentence

EntertainmentGeorge Clooney calls failure a better teacher than success

InternationalTrump to finalise F-35 Fighter Jet deal with Saudi Arabia

Technology Realted Stories

TechnologyTelangana Cabinet clears Bill for welfare of Gig workers

TechnologyGati Shakti Vishwavidyalaya, DRDO sign MoU to develop smart tech solutions for national security

TechnologyCSIR-ISRO Space Meet organised to strengthen India's preparedness for human spaceflight programme

TechnologyPrime Minister Modi meets 16th Finance Commission's delegation

TechnologyMP: National children’s science exhibition to kick off tomorrow