HomeCyber BalkansCisco Small Business Access Vulnerable to Command Injection by Attackers

Cisco Small Business Access Vulnerable to Command Injection by Attackers

Published on

spot_img
Cisco Small Business Access Vulnerable to Command Injection by Attackers

Cisco has recently issued a warning to its customers regarding severe vulnerabilities found in the web-based management interface of its Small Business 100, 300, and 500 Series Wireless Access Points (APs). These vulnerabilities, identified as CVE-2024-20335 and CVE-2024-20336, could potentially allow a remote attacker with authentication to carry out command injection and buffer overflow attacks.

The implications of these vulnerabilities are quite concerning as they could grant an attacker with administrative privileges the ability to execute arbitrary code as the root user on the underlying operating system of the affected devices. This could result in a complete compromise of the wireless access points, allowing attackers to intercept, manipulate, or disrupt network traffic.

The first vulnerability, CVE-2024-20335, allows an authenticated remote attacker to perform command injection attacks through a vulnerability present in the web-based management interface of the Cisco Small Business 100, 300, and 500 Series Wireless Access Points. The attacker must have legitimate administrator credentials for the targeted device to exploit this vulnerability effectively.

The second vulnerability, CVE-2024-20336, enables an authenticated remote attacker to conduct buffer overflow attacks against vulnerable devices through a weakness in their web-based user interface. As with the previous vulnerability, the attacker needs to possess valid administrator credentials for the impacted device.

Users of the affected Cisco Small Business Wireless APs are strongly advised to take immediate action to mitigate the risk of exploitation. Since no patches will be provided for these vulnerabilities, the most secure course of action is to replace the affected devices. Cisco has announced end-of-life for the impacted products and recommends that customers transition to newer models that will continue to receive security updates and support.

A table detailing the affected product series, affected firmware releases, and recommended fixed versions has been provided to assist affected users in transitioning to more secure devices. It is crucial for network administrators to stay informed about such vulnerabilities and ensure that their hardware is up-to-date and supported to prevent security breaches.

To address the severity of these vulnerabilities, affected users are encouraged to consult Cisco’s advisories and seek guidance from the Cisco Technical Assistance Center (TAC) or their maintenance providers on migrating to supported devices. Although there have been no public announcements or reported malicious use of these vulnerabilities, it is imperative for users to take prompt action to secure their networks.

In conclusion, maintaining up-to-date and supported hardware within network infrastructures is essential to prevent potential security threats. Businesses are reminded to regularly review and update their network components to ensure the safety of their systems. By staying informed and taking proactive measures, organizations can safeguard their networks against potential cyber threats.

Source link

Latest articles

Crooks Found a Way Around Google’s Email Verification to Create Workspace Accounts and Access 3rd-Party Services – Krebs on Security

A recent authentication weakness in Google's email verification process for Google Workspace accounts allowed...

HCMC banker recruits Cambodian criminals to steal $316,000 from customer

A bank employee in Ho Chi Minh City (HCMC) has been apprehended for his...

PKfail: A Recently Discovered Pathway for Firmware Malware

Hundreds of laptop and server models from mainstream manufacturers are currently facing a security...

India Postal System Users Targeted by Mobile Phishing Attack

A recent wave of phishing attacks originating from a China-based hacking group known as...

More like this

Crooks Found a Way Around Google’s Email Verification to Create Workspace Accounts and Access 3rd-Party Services – Krebs on Security

A recent authentication weakness in Google's email verification process for Google Workspace accounts allowed...

HCMC banker recruits Cambodian criminals to steal $316,000 from customer

A bank employee in Ho Chi Minh City (HCMC) has been apprehended for his...

PKfail: A Recently Discovered Pathway for Firmware Malware

Hundreds of laptop and server models from mainstream manufacturers are currently facing a security...
en_USEnglish