![]() The vulnerability is due to improper validation of packet data. "The Cisco Smart Install protocol can be abused to modify the TFTP server setting, exfiltrate configuration files via TFTP, modify the configuration file, replace the IOS image, and set up accounts, allowing for the execution of IOS commands," the company explains.Ĭhinese security firm Qihoo 360's Netlab also confirms that that hacking campaign launched by JHT group doesn't involve the recently disclosed code execution vulnerability instead, the attack is caused due to the lack of any authentication in the Cisco smart install protocol, reported in March last year. A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. Posted by compman on Apr 9th, 2018 at 12:10 PM Needs answer Cisco General IT Security General Networking I found out over the weekend about a fairly major attack on Cisco devices CVE-2018-0171. An attacker who has valid administrator access to an affected device. ![]() The vulnerability occurs because the affected software improperly sanitizes user-supplied input. Cisco’s Cyber Security Advisory (cisco-sa-20180328-smi) provides the details of the vulnerability, including the. A vulnerability in Cisco IOS XE Software could allow an authenticated, remote attacker to execute commands on the underlying Linux shell of an affected device with root privileges. ![]() If not needed, running the no-vstack command on the Cisco Switch will disable smart. However, since the hack apparently resets the targeted devices, making them unavailable, Cisco believes hackers have been merely misusing the Smart Install protocol itself to overwrite the device configuration, instead of exploiting a vulnerability. Multiple vulnerabilities in the API and in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow a remote attacker to overwrite arbitrary files or conduct null byte poisoning attacks on an affected device. Cisco Cisco smart install vulnerability, stacking. The affected network switches are susceptible to a Denial of Service vulnerability. This vulnerability was reported to Cisco in 2018 (CVE-20180171) with a CVSS 3.0 base score of 9.8. Some researchers believe the attack involves a recently disclosed remote code execution vulnerability ( CVE-2018-0171) in Cisco Smart Install Client that could allow attackers to take full control of the network equipment. ![]()
0 Comments
Leave a Reply. |