Thursday, May 15, 2025
HomeHardware HackingCisco Switches are Vulnerable to Remote Hack to Gain Full Control Over...

Cisco Switches are Vulnerable to Remote Hack to Gain Full Control Over a Vulnerable Network – Open Port with 8.5 Million Devices

Published on

SIEM as a Service

Follow Us on Google News

A Remote Code Execution flaw that affected the Cisco switches that allow an attacker to gain the full control of the Vulnerable Cisco switch deployed networks.

Scanning the entire internet reveal that, 250,000 vulnerable devices have been presented and 8.5 million devices that have a vulnerable port open.

Researchers Found stack-based buffer overflow vulnerability was found in Cisco Switches  Smart Install Client code that allows an attacker to remotely execute arbitrary code without any further authentication.

- Advertisement - Google News

Smart Install is a Cisco switches new future that provides plug-and-play configuration and image-management.

This Future help to ship a switch to a location, place it in the network and power it on with no configuration on the device required and without an administrator and its also provide a backup configuration.

Also, Director act as common single point manager for images and configuration of client switches and client make both direct and indirect connection to the director.

A discovered critical vulnerability presented in the code of the Cisco Switches Smart Install Client.

Aslo Read: 70% Of Chrome VPN Extensions Leak Your DNS Requests

Vulnerability Description in Cisco Switches

According to embedi, The SMI IBC Server Process process contains a Smart Install Client implementation code. The Smart Install Client starts a server on the TCP(4786) port (opened by default) to interact with the Smart Install Director.

In this case, a stack-based buffer overflow occurs when server processing this  ibd_init_discovery_msg specially crafted malicious message and the buffer overflow takes and abuse the function smi_ibc_handle_ibd_init_discovery_msg.

Two Attack Conditions

1.Reset or change the enable password to enter privileged EXEC mode:

https://youtu.be/CE7KNK6UJuk

2.Intercept traffic between other devices connected to the switch and the Internet:

https://youtu.be/TSg5EZVudNU

Check the equipment for vulnerability

Users can check the vulnerability by performing simple network scan using Nmap with Cisco network equipment with an open portTCP 4786.

nmap -p T:4786 192.168.1.0/24

Aslo To check whether the network equipment is of a Smart Install Client type, enter the following commands:

switch>show vstack config
 Role: Client (SmartInstall enabled)
 Vstack Director IP address: 0.0.0.0

switch>show tcp brief all
TCB       Local Address           Foreign Address        (state)
0344B794  *.4786                  *.*                    LISTEN
0350A018  *.443                   *.*                    LISTEN
03293634  *.443                   *.*                    LISTEN
03292D9C  *.80                    *.*                    LISTEN
03292504  *.80                    *.*                    LISTEN

Affected Cisco Switches

  • Catalyst 4500 Supervisor Engines
  • Catalyst 3850 Series
  • Catalyst 3750 Series
  • Catalyst 3650 Series
  • Catalyst 3560 Series
  • Catalyst 2960 Series
  • Catalyst 2975 Series
  • IE 2000
  • IE 3000
  • IE 3010
  • IE 4000
  • IE 4010
  • IE 5000
  • SM-ES2 SKUs
  • SM-ES3 SKUs
  • NME-16ES-1G-P
  • SM-X-ES3 SKUs

This Flaw has been fixed by Cisco and released the patch CVE : CVE-2018-0171

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...