Sunday, April 28, 2024

Critical RCE Vulnerability in Cisco Protection let Hackers Execute an Arbitrary code Remotely

Multiple critical security vulnerabilities in Cisco allow attackers to execute arbitrary commands with user consent. The vulnerability affects Cisco FXOS Software, Cisco NX-OS Software, and Cisco UCS Manager Software.

Cisco FXOS and UCS Manager – CLI

A vulnerability in CLI of Cisco FXOS Software and Cisco UCS Manager Software allows an authenticated local attacker to execute arbitrary commands on the user device.

The vulnerability is due to lack of input validation, successful exploitation allows the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently logged-in.

Cisco released security updates to address this vulnerability as a part of the February 2020 Cisco FXOS and NX-OS Software Security Advisory.

Cisco FXOS and UCS Manager Software CLI

The vulnerability resides n the CLI of Cisco FXOS Software and Cisco UCS Manager Software that would allow an authenticated, local attacker to execute arbitrary commands.

An attacker could exploit this vulnerability by sending crafted arguments to specific commands, successful exploit could allow the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently logged-in user.

Cisco released security updates to address this vulnerability as a part of the February 2020 Cisco FXOS and NX-OS Software Security Advisory.

Cisco FXOS and NX-OS Software – Arbitrary Code Execution

The vulnerability allows an unauthenticated, adjacent attacker to execute arbitrary code as root or to cause a denial of service (DoS) condition.

“A successful exploit could allow the attacker to cause a buffer overflow that could allow the attacker to execute arbitrary code as root or cause a DoS condition on the affected device.”

Cisco released security updates to address this vulnerability as a part of the February 2020 Cisco FXOS and NX-OS Software Security Advisory.

Read More:

Cisco Small Business Switches Vulnerabilities allows Attackers to Access Sensitive Information and Cause DoS

Cisco Webex Flaw Let Unauthenticated Remote Attackers to Join Private Meetings Without Password

Website

Latest articles

NETGEAR buffer Overflow Vulnerability Let Attackers Bypass Authentication

Some router models have identified a security vulnerability that allows attackers to bypass authentication.To...

5000+ CrushFTP Servers Hacked Using Zero-Day Exploit

Hackers often target CrushFTP servers as they contain sensitive data and are used for...

13,142,840 DDoS Attacks Targeted Organization Around The Globe

DDoS attacks are a significant and growing risk that can overpower websites, crash servers,...

Hackers Exploit Old Microsoft Office 0-day to Deliver Cobalt Strike

Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt...

Microsoft Publicly Releases MS-DOS 4.0 Source Code

In a historic move, Microsoft has made the source code for MS-DOS 4.0, one...

New SSLoad Malware Combined With Tools Hijacking Entire Network Domain

A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which...

Palo Alto Networks Shares Remediation Advice for Hacked Firewalls

Palo Alto Networks has issued urgent remediation advice after discovering a critical vulnerability, designated...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles