• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
chinese hackers exploiting cisco switches zero day to deliver malware

Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware

You are here: Home / General Cyber Security News / Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware
July 2, 2024

A China-nexus cyber espionage team named Velvet Ant has been observed exploiting a zero-working day flaw in Cisco NX-OS Application applied in its switches to produce malware.

The vulnerability, tracked as CVE-2024-20399 (CVSS score: 6.), concerns a case of command injection that lets an authenticated, neighborhood attacker to execute arbitrary instructions as root on the underlying working method of an influenced unit.

“By exploiting this vulnerability, Velvet Ant properly executed a beforehand unknown custom made malware that allowed the threat group to remotely join to compromised Cisco Nexus equipment, add supplemental information, and execute code on the devices,” cybersecurity company Sygnia reported in a assertion shared with The Hacker Information.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cisco stated the issue stems from insufficient validation of arguments that are handed to specific configuration CLI commands, which could be exploited by an adversary by such as crafted input as the argument of an afflicted configuration CLI command.

Cybersecurity

What is extra, it allows a user with Administrator privileges to execute commands with out triggering method syslog messages, thus generating it attainable to conceal the execution of shell instructions on hacked appliances.

Even with the code execution capabilities of the flaw, the lessen severity is owing to the truth that productive exploitation demands an attacker to be already in possession of administrator credentials and have entry to certain configuration instructions. The pursuing gadgets are impacted by CVE-2024-20399 –

  • MDS 9000 Sequence Multilayer Switches
  • Nexus 3000 Sequence Switches
  • Nexus 5500 System Switches
  • Nexus 5600 Platform Switches
  • Nexus 6000 Series Switches
  • Nexus 7000 Sequence Switches, and
  • Nexus 9000 Collection Switches in standalone NX-OS mode

Velvet Ant was to start with documented by the Israeli cybersecurity agency last month in relationship with a cyber attack targeting an unnamed organization situated in East Asia for a period of about 3 many years by setting up persistence utilizing out-of-date F5 Major-IP appliances in purchase to stealthily steal client and financial information.

“Network appliances, particularly switches, are often not monitored, and their logs are routinely not forwarded to a centralized logging system,” Sygnia said. “This deficiency of monitoring results in considerable problems in determining and investigating destructive activities.”

Cybersecurity

The enhancement will come as danger actors are exploiting a critical vulnerability influencing D-Connection DIR-859 Wi-Fi routers (CVE-2024-0769, CVSS rating: 9.8) – a route traversal issue primary to info disclosure – to obtain account information this sort of as names, passwords, groups, and descriptions for all users.

“The exploit’s versions […] allow the extraction of account particulars from the system,” risk intelligence firm GreyNoise claimed. “The product is Close-of-Lifestyle, so it would not be patched, posing extended-expression exploitation risks. A number of XML files can be invoked making use of the vulnerability.”

Identified this article intriguing? Abide by us on Twitter  and LinkedIn to go through additional unique content we put up.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «australian man charged for fake wi fi scam on domestic flights Australian Man Charged for Fake Wi-Fi Scam on Domestic Flights
Next Post: Meta’s ‘Pay or Consent’ Approach Faces E.U. Competition Rules Scrutiny meta's 'pay or consent' approach faces e.u. competition rules scrutiny»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.