Tuesday, July 16, 2024
EHA

Critical SSH Key Vulnerability in Cisco Switches let Hackers to Access the Vulnerable System Remotely

Cisco released a security updates with fixes for several product including Cisco Nexus 9000 Series Fabric Switches that affected by critical SSH key vulnerability that allow remote attackers gain access to the affected system.

A Critical Vulnerability (CVE-2019-1804) in SSH key pair for the software’s Secure Shell (SSH) key management function that allows attacks to discover the pairing and connect to a vulnerable Nexus 9000 Series device remotely.

This bug leaks to an attacker could exploit this vulnerability by opening an SSH connection via IPv6 to a targeted device using the extracted key materials.

Additionally Cisco patched 22 high-severity flaws and 18 medium-severity flaws that affected various other Cisco products.

Another high severity vulnerability (CVE-2019-1803) that affected Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an authenticated, local attacker with administrator rights to gain elevated privileges.

A command infection vulnerability (CVE-2019-1816) that affected Cisco Web Security Appliance (WSA) let local attacker to exploit the bug and elevate privileges to root.

“Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition.”

A Complete List of Vulnerabilities that Patched by Cisco

Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Default SSH Key Vulnerability
 
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN Denial of Service Vulnerability
 
Cisco Firepower Threat Defense Software TCP Ingress Handler Denial of Service Vulnerability
 
Cisco Firepower Threat Defense Software SMB Protocol Preprocessor Detection Engine Denial of Service Vulnerabilities
 
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Low-Entropy Keys Vulnerability
 
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN Denial of Service Vulnerability
 
Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software TCP Timer Handling Denial of Service Vulnerability
 
Cisco Firepower Threat Defense Software Packet Processing Denial of Service Vulnerability
 
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software VPN SAML Authentication Bypass Vulnerability
 
Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software MOBIKE Denial of Service Vulnerability
 
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Root Privilege Escalation Vulnerability
 
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Lightweight Directory Access Protocol Denial of Service Vulnerability
 
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software TCP Proxy Denial of Service Vulnerability
 
Cisco Adaptive Security Appliance and Firepower Threat Defense Software Layer 2 Filtering Bypass Vulnerability
 
Cisco Adaptive Security Appliance and Firepower Threat Defense Software WebVPN Cross-Site Scripting Vulnerabilities
 
Cisco Web Security Appliance Privilege Escalation Vulnerability
 
Cisco Web Security Appliance Malformed Request Denial of Service Vulnerability
 
Cisco Umbrella Dashboard Session Management Vulnerability
 
Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability
 
Cisco Small Business RV320 and RV325 Routers Session Hijacking Vulnerability
 
Cisco IP Phone 7800 Series and 8800 Series Session Initiation Protocol XML Denial of Service Vulnerability
 
Cisco Adaptive Security Appliance Software IPsec Denial of Service Vulnerability
 
Cisco Adaptive Security Appliance Software Cross-Site Request Forgery Vulnerability
 
Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability
 
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Insecure Fabric Authentication Vulnerability
 
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Privilege Escalation Vulnerability
 
Cisco Adaptive Security Appliance Software Privilege Escalation Vulnerability
 
Cisco Adaptive Security Appliance Software VPN Denial of Service Vulnerability
 
Cisco Prime Network Registrar Cross-Site Scripting Vulnerability
 
Cisco Prime Collaboration Assurance Cross-Site Scripting Vulnerability
 
Cisco HyperFlex HX-Series Web-Based Management Interface Cross-Site Request Forgery Vulnerability
 
Cisco Firepower Threat Defense Software Command Injection Vulnerability
 
Cisco Firepower Threat Defense Software Command Injection Vulnerability
 
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Symbolic Link Path Traversal Vulnerability
 
Cisco Expressway Series Directory Traversal Vulnerability
 
Cisco Email Security Appliance Filter Bypass Vulnerability
 
Cisco Application Policy Infrastructure Controller Web-Based Management Interface Cross-Site Scripting Vulnerability
 
Cisco Application Policy Infrastructure Controller Web-Based Management Interface Usage Information Disclosure Vulnerability
 
Cisco Application Policy Infrastructure Controller Recoverable Encryption Key Vulnerability
 
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Unmeasured Boot Vulnerability
 
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Filter Query Information Disclosure Vulnerability

Cisco advised users to apply these patches immediately to keep the network safe and secure.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Also Read:

Cisco Fixed Routers Vulnerabilities that Allows Hackers to Run Remote Code with Root Access

Hackers Exploiting More than 9000 Cisco RV320/RV325 Routers After POC published in GitHub

Unpatched Critical Flaw in Cisco Small Business Switches Allows Attackers to Bypass User Authentication

Cisco Released Security Updates & Fixed Several Vulnerabilities that Affected Cisco Products

Privilege Escalation Flaw in Cisco ASA Allows Attackers To Read or Write Files in the System


Website

Latest articles

New Poco RAT Weaponizing 7zip Files Using Google Drive

The hackers weaponize 7zip files to pass through security measures and deliver malware effectively.These...

New ShadowRoot Ransomware Attacking Business Via Weaponized PDF’s

X-Labs identified basic ransomware targeting Turkish businesses, delivered via PDF attachments in suspicious emails...

Hacktivist Groups Preparing for DDoS Attacks Targeting Paris Olympics

Cyble Research & Intelligence Labs (CRIL) researchers have identified a cyber threat targeting the...

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles