Oct 17 2023

CISCO’S TICKING TIME BOMB: CVE-2023-20198 WITH CVSS SCORE 10 HITS CISCO DEVICES

Category: Network securitydisc7 @ 9:10 am

Cisco IOS XE is a robust and flexible operating system, optimized for the evolving landscape of enterprise networking and technology. It enables model-driven programmability, application hosting, and automated configuration management, thus simplifying many day-to-day tasks. IOS XE is integral in providing consistency across Cisco’s array of switching, routing, and wireless network devices.

THE VULNERABILITY: CVE-2023-20198


A new, critical zero-day vulnerability has emerged, labeled as CVE-2023-20198. This vulnerability, with a maximum severity rating of CVSS 10, predominantly affects devices running the Cisco IOS XE software and is currently without a patch, leaving systems vulnerable to potential exploits. The flaw can be exploited by an unauthenticated attacker to create a user account with the highest privilege level, leading to unauthorized system access.

Exploitation in the Wild
Attackers have already begun exploiting this vulnerability in the wild, utilizing it to deliver malicious implants. Organizations using the affected devices are advised to apply mitigation measures promptly to defend against these exploits.

Affected Devices and Systems
The vulnerability, CVE-2023-20198, affects all Cisco IOS XE devices that have the Web UI feature enabled, especially when exposed to the internet or untrusted networks. To ascertain if a system is vulnerable, administrators should:

  1. Utilize the command show running-config | include ip http server|secure|active to check for the presence of ip http server or ip http secure-server commands in the global configuration.
  2. Inspect the configuration for ip http active-session-modules none or ip http secure-active-session-modules none to determine if the vulnerability is exploitable over HTTP or HTTPS respectively.

Cisco’s Response
Cisco has acknowledged the vulnerability, confirming its presence in devices running the Cisco IOS XE software. The company provided steps to identify affected systems and noted the following Indicators of Compromise (IoCs):

  1. System logs containing messages indicating programmatic configuration by unfamiliar users, such as:
  • %SYS-5-CONFIG_P: Configured programmatically by process SEP_webui_wsma_http from console as user on line.
  • %SEC_LOGIN-5-WEBLOGIN_SUCCESS: Login Success [user: user] [Source: source_IP_address].
  1. System logs containing messages about unknown file installation actions, like:
  • %WEBUI-6-INSTALL_OPERATION_INFO: User: username, Install Operation: ADD filename.
  1. Presence of an implant, checked by issuing the following command from a workstation with access to the affected system:
  • curl -k -X POST "https://systemip/webui/logoutconfirm.html?logon_hash=1", if a hexadecimal string is returned, the implant is present.

Cisco, alongside other cybersecurity firms like Tenable, has provided plugins to identify affected systems. While awaiting a patch, these plugins and the aforementioned checks can assist in identifying and mitigating unauthorized access attempts.


CVE-2023-20198 poses a significant threat to cybersecurity due to its maximum severity rating and the absence of a patch. Organizations using affected Cisco IOS XE devices should remain vigilant and apply necessary mitigation measures to safeguard their systems from potential exploits.

Zero Trust Architecture (Networking Technology: Security)

InfoSec tools | InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory

Tags: Cisco, CVE-2023-20198, Zero Trust Architecture


Jul 27 2010

What You Can Do About Cloud Computing Security

Category: Cloud computingDISC @ 9:13 am

Cloud computing security risks are sometimes considered greater than cloud’s rewards. The industry is working to change that, and so can you.

By James A. Martin
Cloud computing offers many compelling benefits to organizations, such as reduced capital and operating costs and as-needed scalability. So why aren’t more businesses taking advantage of the on-demand computing resources services collectively known as ‘the cloud’?

Security concerns are easily the number one inhibitor to deploying the cloud,” says Zeus Kerravala, senior vice president of Global Enterprise and Consumer Research, Yankee Group. “It just gives some people cause for concern.”

How Cloud Technology Enables New Business Models

Although no form of computing is entirely risk-free 100 percent of the time, cloud computing isn’t necessarily any more or less secure than non-virtualized or non-cloud environments, says Christofer Hoff, director of cloud and virtualization solutions for Cisco’s Security Technology Business Unit and author of the Rational Survivability blog.

“It’s how organizations deploy and manage cloud computing that makes the difference,” Hoff explains.

Fortunately, Cisco, its service provider partners and others in the cloud computing industry are collaborating to provide ever-greater security, visibility and control to consumers of cloud services, Hoff adds. And there are plenty of things enterprises can do to take advantage of cloud computing’s benefits without compromising security.

To read the reamining article ….

 

Related articles by Zemanta





Tags: Application Service Providers, Business-to-Business, Cisco, Cloud computing, E-Commerce, Yankee Group