Wednesday, June 19, 2024

Cisco Patches Critical Vulnerability that allows Remote Attacker to Conduct CSRF Attack

Cisco patches a critical vulnerability in the web-based UI (web UI) of Cisco IOS XE Software that could cause allow an unauthenticated, remote attacker to perform a CSRF attack on the vulnerable system.

The vulnerability is due to a lack of validation in the web UI, which allows an attacker to exploit this vulnerability by convincing the current user to follow the malicious link.

Successful exploitation of the vulnerability allows an attacker to perform arbitrary code execution with the privileges of the affected user.

If the affected user has administrative privileges, then the attacker could execute commands, reload the device, and alter the configuration of the vulnerable device.

The vulnerability was detected during internal security testing, and it can be tracked as CVE-2019-1904.

“Cisco Product Security Incident Response Team (PSIRT) aware of the existence of exploit code, but there are no indications at this time that this exploit code is publicly available. Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory,” reads the Cisco report.

Administrators can determine the Cisco IOS XE Software release is running on a device by using the following command.

ios-xe-device# show version

Cisco confirms there is no workaround for the issue at this time, recommended disabling HTTP Server feature to eliminate the attack vector until the affected are upgraded.

“Administrators can disable the HTTP Server feature by using the no ip http server or no ip http secure-server command in global configuration mode.”

Cisco released security updates to address this vulnerability; you can use Cisco IOS Software Checker to lookup for Cisco Security Advisories that apply to specific Cisco IOS and IOS XE Software releases.

Related Read

Critical SSH Key Vulnerability in Cisco Switches let Hackers to Access the Vulnerable System Remotely

Cisco Security Updates – RCE Flaw in Cisco Industrial Network Director Let Hackers Gain Admin Level Access

phpMyAdmin CSRF Vulnerability Allows An Attacker to Deleting Records From Database


Latest articles

Amtrak Data Breach: Hackers Accessed User’s Email Address

Amtrak notified its customers regarding a significant security breach involving its Amtrak Guest Rewards...

Chrome Security Update – Patch for 6 Vulnerabilities

Google has announced a new update for the Chrome browser, rolling out version 126.0.6478.114/115...

Hackers Weaponize Windows Installer (MSI) Files to Deliver Malware

Cybersecurity researchers have uncovered a sophisticated malware campaign orchestrated by a threat actor group,...

Hackers Using VPNs To Exploit Restrictions & Steal Mobile Data

Hackers are offering "free" mobile data access on Telegram channels by exploiting loopholes in...

New PhaaS Platform Lets Attackers Bypass Two-Factor Authentication

Several phishing campaign kits have been used widely by threat actors in the past....

Stuxnet, The Malware That Propagates To Air-Gapped Networks

Stuxnet, a complex worm discovered in 2010, targeted Supervisory Control and Data Acquisition (SCADA)...

Threat Actors Claiming Breach of AMD Source Code on Hacking Forums

A threat actor named " IntelBroker " claims to have breached AMD in June...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles