Saturday, July 11, 15:09
Home security Cisco: Errors on iOS routers allow complete system breaches

Cisco: Errors on iOS routers allow complete system breaches

Cisco has revealed four critical errors security affecting the router equipment used by IOS XE and IOS software of. The four critical errors are part of Cisco's six-month advisory package from June 3 for IOS XE and IOS network software, which includes 23 tips on 25 vulnerabilities.
More specifically, the seriousness error of 9,8 out of 10, identified as CVE-2020-3227, concerns the authorization control details for the Cisco IOx application hosting infrastructure in the Cisco IOS XE software, which allows a remote intruder without credentials execute Cisco IOx API commands without proper authorization.


Cisco has also published two more tips that cover three critical IOS errors that affect its industrial routers. The error, identified as CVE-2020-3205, is a vulnerability in the application of the Cisco IOS software interface for the Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) .

An intruder could send malicious packets to an affected device, gain control YOU and then compromise the system, including the IOS VM and the VM visitor. VDS handles it access into a Appliances shared by IOS and the operating system visitor, such as flash memory, ports USB and the console.


According to Cisco, a successful operation could allow an intruder to carry out arbitrary orders as part of Linux VDS shell with privileges root user. He added that because the device is designed with hypervisor architecture, taking advantage of a vulnerability that affects the Inter-VM channel can lead to a complete breach of the system. Errors identified as CVE-2020-3198 and CVE-2020-3258 are part of the same advice and relate to the vulnerability of executing remote code on the same Cisco industrial routers. Cisco describes its 800 industrial routers as extremely secure and compact devices designed for harsh environments, with applications ranging from surveillance and production gateway tasks in distribution automation, pipeline and road monitoring, fleet management and public transport.


CVE-2020-3198 error, with a severity rating of 9,8 out of 10, allows an unauthorized remote intruder to arbitrarily execute code on affected systems or even lead a system to "crush" or reload.

An intruder could exploit this error by sending malicious UDP packets via IPv4 or IPv6 to an affected device. Cisco notes that the error can be mitigated by applying an access control list that restricts incoming traffic to the device's UDP 9700 port. According to Cisco, the error is due to incorrect checking of specific price limits on packages intended for the UDP 9700 port of an affected device. An intruder could exploit this error by sending malicious packets to an affected device. When packets are processed, memory overflow may occur. A successful operation could allow an intruder to execute remote code as part of Cisco IOS VM software running on an affected system or cause a reload on an affected device.

The error, identified as CVE-2020-3258, which has a severity rating of 5,7 out of 10, could allow an unauthorized local intruder to arbitrarily execute code on the device. However, the intruder must also have valid user credentials at level 15, the highest level in Cisco's design. In addition, the error allows an intruder to modify the device's execution time memory, replace system memory locations, and arbitrarily execute code on the affected device.

The errors were detected by the Cisco Advanced Security Initiatives Group.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Pohackontas
Pohackontashttps://www.secnews.gr
Every accomplishment starts with the decision to try.

LIVE NEWS

The best books of 2020, according to Amazon

If you like good books and are looking for new additions to your collection, choose from the 5 best books, according to ...

US Secret Service: Warns of increased attacks on MSPs

In June, the US Secret Service warned the private sector as well as government agencies that there has been a worrying increase ...

Create an imaginative meme and win a OnePlus Nord

One of the most anticipated financial smartphones of OnePlus, the OnePlus Nord, is going to be presented soon at an event that will take place ...

Sony: Invest $ 250 Million in Fortnite Epic Games!

Sony has made an investment of $ 250 million to acquire a 1,4% stake in Epic Games, ...

C-Data FTTH OLT devices contain backdoors

Serious vulnerabilities and backdoors were discovered by two security researchers in the firmware of 29 FTTH OLT devices, the popular equipment provider C-Data.

Spotify, Pinterest and Tinder are "crashing" because of D. Facebook

Popular applications and services, such as Spotify, Pinterest and Tinder, have cracked iOS devices ....

Technology and Teachers: What Do Experts Appreciate?

Too many educators around the world have struggled to adopt the technological tools in the midst of the pandemic to deliver lessons ...
00:02:24

COVID-19 apps: Virus detection applications violate privacy

COVID-19 apps: Beware, they violate private privacy Virus detection applications violate private privacy by recording more data than they need, setting ...

Debian 8 “Jessie”: Another version in End-of-life stage

After a long support of Debian 8 "Jessie", the development team of the operating system announced that it stops ...

Conti ransomware: Is it the successor to Ryuk ransomware?

Conti ransomware is a new threat targeting corporate networks. Its advanced capabilities allow it ...