Sunday, June 16, 2024

Cisco IOS XE Software Vulnerabilities Let Hackers Gain Root Access in Cisco Devices

Cisco released a security update for multiple vulnerabilities that affected Cisco IOS XE Software web-based user interface (Web UI) that allows a remote attacker to execute commands with elevated privileges on the vulnerable system.

Cisco IOS XE Software is an internetworking operating system for enterprise networks and is using in several Cisco devices such as Some Cisco routers (such as ASR 1000) and some Catalyst switches (such as 3850).

This Vulnerable software running Cicso deployed in various Enterprise Networks, data centers, and smaller businesses and the potential attacker exploit the vulnerable devices remotely.

According to the Cisco update, These two ( CVE-2019-12650) ( CVE-2019-12651 ) vulnerabilities are not dependent on one another and the attacker no need to exploit one vulnerability to take over another vulnerability.

Both vulnerabilities affected Cisco devices that running vulnerable IOS XE Software release with the HTTP Server feature enabled.

Command Injection Vulnerabilities

A first vulnerability (CVE-2019-12651) with web-based user interface (Web UI) of Cisco IOS XE Software allows low privileged attackers possibly execute the arbitrary command on the vulnerable devices that running with Cisco IOS to elevate privileges.

Another vulnerability (CVE-2019-12650) that affected the web-based user interface (Web UI) due to improperly sanitizes user-supplied input of Cisco IOS XE Software allows remote attackers to execute commands on the underlying Linux shell of vulnerable devices and gain the root access.

According to the Cisco security update, Due to the improperly sanitizes user-supplied input in Cisco IOS, an attacker could exploit this vulnerabilities by supplying a crafted input parameter on a form in the Web UI and then submitting that form.

Customers recommended to disabling the HTTP Server feature eliminates the attack vector for these vulnerabilities until upgrade the system and apply the patch released by Cisco.

Following command will help to check and shows the output will confirm that it has the HTTP Server feature enabled.

Router# show running-config | include ip http server|secure-server
ip http server
ip http secure-server

If you find the presence of either command indicate that the HTTP Server feature is enabled.

If both http server and http-secure server are in use, then both commands are required to disable the HTTP Server feature.

In this case, Cisco adviced to using the following command in global configuration mode. no ip http server or no ip http secure-server.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates

Also Read: Top 7 Vulnerability Database Sources to Trace New Vulnerabilities

Website

Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles