Home / Networking / Security bugs in popular Cisco switch brand allow hackers to take over devices

Security bugs in popular Cisco switch brand allow hackers to take over devices


Cisco switches
Advertisements

Image: Cisco // Composition: ZDNet

Cisco has patched today three dangerous bugs in one of its most popular products, the Cisco Small Business 220 Series of smart switches.

The three bugs are an authentication bypass (CVE-2019-1912, rated Critical, rating of 9.1 out of 10), a remote code execution (CVE-2019-1913, rated Critical, rating of 9.8 out of 10), and a command injection (CVE-2019-1914, rated Mediu, rating of 7.2 out of 10).

Of the three, the first two are the most dangerous because they can be exploited by remote attackers over the internet without needing to authenticate on the device. This means that any Cisco 220 Series smart switch that is reachable over the internet can be attacked.

In a security advisory published today, Cisco said attackers can leverage the authentication bypass vulnerability to upload files on Cisco 220 switches, either to replace configuration files or plant a reverse shell.

The second bug, and the most dangerous of the three, allows attackers to run malicious code with root privileges, effectively allowing attackers to take over devices with a simple HTTP or HTTPS request aimed at unpatched switches.

Patches and basic mitigations are available

The good news is that the three vulnerabilities reside in the switches’ web management interface. Device owners can either turn off the web management interface or install the updates Cisco released today.

The company fixed the three bugs in Cisco Small Business 220 Series Smart Switches firmware version 1.1.4.4. All previous versions are to be considered vulnerable, the device maker said.

Cisco credited security researcher bashis for reporting the vulnerabilities through the VDOO Disclosure Program.

However, attackers interested in taking over Cisco routers are currently free to reverse-engineer the firmware and discover a way to exploit the three security flaws on their own.

All three bugs can be integrated into automated exploitation tools and then embedded into botnet scanners to start attacks.

Cisco devices are one of the most targeted equipment brands on the internet today, mainly because of their wide adoption. There is always one or more threat actors looking for vulnerable Cisco gear any day of the week, according to Bad Packets, a cyber-security firm that keeps track of botnet activity and malicious internet scanning.

More vulnerability reports:



Source link

Advertisements

About admin

I'm a 50 year old PLC programmer from Burnley, UK. I severed my time as an electrician in the baking industry and soon got involved with the up and coming technology of PLC's. Initially this was all based in the Uk but as the years went by I have gradually worked my way around the globe. At first it was mainly Mitsubishi with a bit of Modicon thrown in but these days the industry leaders seem to be the Allen Bradley range of PLC and HMI’s.

Check Also

Singapore readies satellite road toll system for 2021 rollout

Advertisements Singapore will begin installing its satellite-based Electronic Road Pricing (ERP) network from the first ...

Leave a Reply

Your email address will not be published. Required fields are marked *

Advertisements