AI DevwWrld Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Serious zero-day vulnerability in Cisco's IOS XE software: attackers can take control of routers and switches

Serious security risk for Cisco devices: a zero-day vulnerability puts routers and switches at risk

Cisco has found a serious vulnerability in its IOS XE software that allows unauthenticated hackers to gain full administrator privileges and remote control of routers and switches. To mitigate risk, Cisco recommends disabling the HTTP server feature on devices exposed to the Internet.

This pill is also available in Italian language

Cisco has issued a critical security alert to administrators regarding a serious zero-day authentication bypass vulnerability in its IOS XE software. This flaw allows unauthenticated attackers to gain full administrator privileges and take complete control of routers and switches remotely.

Devices with the web UI enabled

This critical vulnerability has been officially identified with the code CVE-2023-20198 and is still awaiting a patch. It only affects devices that have the Web User Interface (Web UI) feature enabled, in combination with the HTTP or HTTPS Server feature enabled.

Attacks in progress and the ability to create accounts

Cisco has identified the active execution of this previously unknown vulnerability in the Web User Interface (Web UI) component of Cisco IOS XE Software. It is important to note that exploitation of the vulnerability is possible when such devices are exposed to the Internet or untrusted networks.

Cisco recommended mitigation measures

To mitigate this threat, Cisco recommends that administrators disable the HTTP server feature on systems exposed to the Internet, effectively eliminating the attack vector and blocking potential attacks. The company recommends customers to use commands like no ip http server or no ip http secure-server in global configuration mode to completely disable the HTTP server feature. Additionally, after disabling this feature, the copy running-configuration startup-configuration command should be run to ensure that the HTTP server feature is not unexpectedly enabled during system reboots.

Follow us on Telegram for more pills like this

10/17/2023 08:37

Editorial AI

Last pills

Global threat: serious security flaw discovered in the IEEE 802.11 Wi-Fi standardNew flaw in the IEEE 802.11 Wi-Fi standard exposes the security of global networks to serious risks

The fundamental aspects of computer security in everyday lifeProtection and prevention: how to safeguard personal data in the digital world

Black Basta hits Synlab: analysis of the attack and cybersecurity lessons for the healthcare sectorCyber defense strategies: how to protect healthcare infrastructures from ransomware

Google releases an emergency update for ChromeUrgent update to fix critical vulnerability in Chrome, users advised to install it immediately