HomeCyber BalkansCisco Small Business Access Vulnerable to Command Injection by Attackers

Cisco Small Business Access Vulnerable to Command Injection by Attackers

Published on

spot_img

Cisco has recently issued a warning to its customers regarding severe vulnerabilities found in the web-based management interface of its Small Business 100, 300, and 500 Series Wireless Access Points (APs). These vulnerabilities, identified as CVE-2024-20335 and CVE-2024-20336, could potentially allow a remote attacker with authentication to carry out command injection and buffer overflow attacks.

The implications of these vulnerabilities are quite concerning as they could grant an attacker with administrative privileges the ability to execute arbitrary code as the root user on the underlying operating system of the affected devices. This could result in a complete compromise of the wireless access points, allowing attackers to intercept, manipulate, or disrupt network traffic.

The first vulnerability, CVE-2024-20335, allows an authenticated remote attacker to perform command injection attacks through a vulnerability present in the web-based management interface of the Cisco Small Business 100, 300, and 500 Series Wireless Access Points. The attacker must have legitimate administrator credentials for the targeted device to exploit this vulnerability effectively.

The second vulnerability, CVE-2024-20336, enables an authenticated remote attacker to conduct buffer overflow attacks against vulnerable devices through a weakness in their web-based user interface. As with the previous vulnerability, the attacker needs to possess valid administrator credentials for the impacted device.

Users of the affected Cisco Small Business Wireless APs are strongly advised to take immediate action to mitigate the risk of exploitation. Since no patches will be provided for these vulnerabilities, the most secure course of action is to replace the affected devices. Cisco has announced end-of-life for the impacted products and recommends that customers transition to newer models that will continue to receive security updates and support.

A table detailing the affected product series, affected firmware releases, and recommended fixed versions has been provided to assist affected users in transitioning to more secure devices. It is crucial for network administrators to stay informed about such vulnerabilities and ensure that their hardware is up-to-date and supported to prevent security breaches.

To address the severity of these vulnerabilities, affected users are encouraged to consult Cisco’s advisories and seek guidance from the Cisco Technical Assistance Center (TAC) or their maintenance providers on migrating to supported devices. Although there have been no public announcements or reported malicious use of these vulnerabilities, it is imperative for users to take prompt action to secure their networks.

In conclusion, maintaining up-to-date and supported hardware within network infrastructures is essential to prevent potential security threats. Businesses are reminded to regularly review and update their network components to ensure the safety of their systems. By staying informed and taking proactive measures, organizations can safeguard their networks against potential cyber threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...