Unpatched Critical Flaw in Cisco Small Business Switches Allows Attackers to Bypass User Authentication

A critical vulnerability with Cisco Small Business Switches that allows an remote attacker to log to an affected device and to execute commands with admin privileages.

The vulnerability can be tracked as CVE-2018-15439, and exists with Cisco Small Business Switch SOHO that used to manage the small local area networks.

Following are the products affected by the vulnerability

  • Cisco Small Business 200 Series Smart Switches
  • CSB 300 Series Managed Switches
  • CSB 500 Series Stackable Managed Switches
  • Cisco 250 Series Smart Switches
  • Cisco 350 Series Managed Switches
  • Cisco 350X Series Stackable Managed Switches
  • Cisco 550X Series Stackable Managed Switches

Cisco Small Business Switches which runs with the which runs with default configuration on the devices listed as vulnerable includes a default, privileged user account that is used for the initial login and cannot be removed from the system are vulnerable, reads Cisco advisory.

“If all user-configured privilege level 15 accounts are removed from the device configuration, an affected software release re-enables the default privileged user account without notifying administrators of the system.”

Workarounds

Cisco recommends administrators to add atleast one user account with level 15 privilege in the device configuration, so that default privileged account will be disabled.

Cisco not yet released any software updates to address this vulnerability.

Related Read

Cisco Releases Security Updates that Covers 16 Vulnerabilities that had Critical and High Impact

Cisco Released Security Updates for Multiple Vulnerabilities that Affected Cisco Products

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…

1 day ago

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…

3 days ago

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…

3 days ago

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…

4 days ago

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…

4 days ago

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…

4 days ago