web analytics

Cisco Patches an Exploited Zero-Day Vulnerability – Source: www.databreachtoday.com

Rate this post

Source: www.databreachtoday.com – Author: 1

Cyberwarfare / Nation-State Attacks
,
Fraud Management & Cybercrime
,
Network Firewalls, Network Access Control

China-Nexus Hackers Velvet Ant Exploited the Bug in April, Cisco and Sygnia Say

Rashmi Ramesh (rashmiramesh_) •
July 2, 2024    

Cisco Patches an Exploited Zero-Day Vulnerability
Image: Shutterstock

Cisco on Monday patched a zero-day vulnerability discovered months ago that allowed a China-nexus hacker to execute arbitrary commands as root on the compromised devices.

See Also: Close the Case on Ransomware

The threat group, dubbed Velvet Ant, remotely connected to Cisco’s NX-OS software used in switches and executed malicious code. The networking giant in an advisory attributes the discovery to cybersecurity firm Sygnia.

Tracked as CVE-2024-20399, the command injection vulnerability allows an authenticated local attacker to execute arbitrary commands as root.

Network appliances, particularly switches, are often unmonitored, and their logs are frequently not forwarded to a centralized logging system. This already creates “significant challenges” in identifying and investigating malicious activities, Sygnia said. But a lack of log review may not have mattered with this flaw. The vulnerability gives the user administrator privileges to carry out commands without triggering system syslog messages, making it easier to conceal the execution of shell commands.

The vulnerability is rated 6 on the CVSS scale despite its code execution capabilities and the widespread use of Cisco Nexus switches in enterprise environments such as data centers. The score is low because most Nexus switches are not directly exposed to the internet, meaning the attacker would need to already have initial access by possessing admin credentials and specific command configurations for the exploitation to be successful.

Despite the prerequisites necessary to exploit the vulnerability, the incident “demonstrates the tendency of sophisticated threat groups to leverage network appliances, which are often not sufficiently protected and monitored, to maintain persistent network access,” Sygnia said.

The potentially state-sponsored threat actor last month used outdated F5 BIG-IP appliances to execute custom malware in order to steal customer and financial data from an undisclosed East Asian company, and the campaign went undetected for three years.

For the new vulnerability, Cisco advises companies to change admin credentials and monitor activity as a preventive measure. Admins can check their devices’ exposure on the software checker page.

Original Post url: https://www.databreachtoday.com/cisco-patches-exploited-zero-day-vulnerability-a-25682

Category & Tags: –

Views: 0

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts