Thursday, October 10, 2024
HomeCyber Security NewsCisco Patches Critical Vulnerability that allows Remote Attacker to Conduct CSRF Attack

Cisco Patches Critical Vulnerability that allows Remote Attacker to Conduct CSRF Attack

Published on

Cisco patches a critical vulnerability in the web-based UI (web UI) of Cisco IOS XE Software that could cause allow an unauthenticated, remote attacker to perform a CSRF attack on the vulnerable system.

The vulnerability is due to a lack of validation in the web UI, which allows an attacker to exploit this vulnerability by convincing the current user to follow the malicious link.

Successful exploitation of the vulnerability allows an attacker to perform arbitrary code execution with the privileges of the affected user.

- Advertisement - EHA

If the affected user has administrative privileges, then the attacker could execute commands, reload the device, and alter the configuration of the vulnerable device.

The vulnerability was detected during internal security testing, and it can be tracked as CVE-2019-1904.

“Cisco Product Security Incident Response Team (PSIRT) aware of the existence of exploit code, but there are no indications at this time that this exploit code is publicly available. Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory,” reads the Cisco report.

Administrators can determine the Cisco IOS XE Software release is running on a device by using the following command.

ios-xe-device# show version

Cisco confirms there is no workaround for the issue at this time, recommended disabling HTTP Server feature to eliminate the attack vector until the affected are upgraded.

“Administrators can disable the HTTP Server feature by using the no ip http server or no ip http secure-server command in global configuration mode.”

Cisco released security updates to address this vulnerability; you can use Cisco IOS Software Checker to lookup for Cisco Security Advisories that apply to specific Cisco IOS and IOS XE Software releases.

Related Read

Critical SSH Key Vulnerability in Cisco Switches let Hackers to Access the Vulnerable System Remotely

Cisco Security Updates – RCE Flaw in Cisco Industrial Network Director Let Hackers Gain Admin Level Access

phpMyAdmin CSRF Vulnerability Allows An Attacker to Deleting Records From Database

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability...

Wireshark 4.4.1 Released, What’s new!

Wireshark, the world’s leading network protocol analyzer, has just released version 4.4.1, bringing a...