AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Serious zero-day vulnerability in Cisco's IOS XE software: attackers can take control of routers and switches

Serious security risk for Cisco devices: a zero-day vulnerability puts routers and switches at risk

Cisco has found a serious vulnerability in its IOS XE software that allows unauthenticated hackers to gain full administrator privileges and remote control of routers and switches. To mitigate risk, Cisco recommends disabling the HTTP server feature on devices exposed to the Internet.

This pill is also available in Italian language

Cisco has issued a critical security alert to administrators regarding a serious zero-day authentication bypass vulnerability in its IOS XE software. This flaw allows unauthenticated attackers to gain full administrator privileges and take complete control of routers and switches remotely.

Devices with the web UI enabled

This critical vulnerability has been officially identified with the code CVE-2023-20198 and is still awaiting a patch. It only affects devices that have the Web User Interface (Web UI) feature enabled, in combination with the HTTP or HTTPS Server feature enabled.

Attacks in progress and the ability to create accounts

Cisco has identified the active execution of this previously unknown vulnerability in the Web User Interface (Web UI) component of Cisco IOS XE Software. It is important to note that exploitation of the vulnerability is possible when such devices are exposed to the Internet or untrusted networks.

Cisco recommended mitigation measures

To mitigate this threat, Cisco recommends that administrators disable the HTTP server feature on systems exposed to the Internet, effectively eliminating the attack vector and blocking potential attacks. The company recommends customers to use commands like no ip http server or no ip http secure-server in global configuration mode to completely disable the HTTP server feature. Additionally, after disabling this feature, the copy running-configuration startup-configuration command should be run to ensure that the HTTP server feature is not unexpectedly enabled during system reboots.

Follow us on Threads for more pills like this

10/17/2023 08:37

Editorial AI

Last pills

Serious vulnerability discovered in Rabbit R1: all user data at riskVulnerability in Rabbit R1 exposes sensitive API keys. What are the privacy risks?

Cyber attack in Indonesia: the new Brain Cipher ransomware brings services to their kneesNew ransomware hits Indonesia: learn how Brain Cipher crippled essential services and the techniques used by hackers

Patelco Credit Union: security incident halts customer services in CaliforniaService disruption and customer frustration: Patelco Credit Union works to resolve security incident

Cyber attack on TeamViewer: immediate response and investigations underwayStrengthened security measures and international collaborations to counter the cyber threat