• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisco issues patch for critical rce vulnerability in rcm for

Cisco Issues Patch for Critical RCE Vulnerability in RCM for StarOS Software

You are here: Home / General Cyber Security News / Cisco Issues Patch for Critical RCE Vulnerability in RCM for StarOS Software
January 21, 2022

Cisco Systems has rolled out fixes for a critical security flaw influencing Redundancy Configuration Supervisor (RCM) for Cisco StarOS Software package that could be weaponized by an unauthenticated, distant attacker to execute arbitrary code and get about vulnerable machines.

Tracked as CVE-2022-20649 (CVSS score: 9.), the vulnerability stems from the actuality that the debug manner has been incorrectly enabled for unique expert services.

“An attacker could exploit this vulnerability by connecting to the machine and navigating to the assistance with debug manner enabled,” Cisco mentioned in an advisory. “A effective exploit could permit the attacker to execute arbitrary commands as the root consumer.”

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The network equipment maker, nevertheless, famous that the adversary would need to execute in-depth reconnaissance to permit for unauthenticated access to vulnerable devices.

Automatic GitHub Backups

Stating that the vulnerability was found for the duration of interior security screening, Cisco additional it observed no proof of active exploitation in destructive attacks.

On prime of this, the firm also remediated a range of other flaws —

  • CVE-2022-20648 (CVSS score: 5.3) – Cisco RCM Debug Information and facts Disclosure Vulnerability
  • CVE-2022-20685 (CVSS rating: 7.5) – Various Cisco Merchandise Snort Modbus Denial of Service Vulnerability
  • CVE-2022-20655 (CVSS rating: 8.8) – ConfD CLI Command Injection Vulnerability

Cisco described that CVE-2022-20655 is due to an “insufficient validation of a method argument” on an influenced machine.

“An attacker could exploit this vulnerability by injecting commands for the duration of the execution of this procedure,” it claimed. “A profitable exploit could allow for the attacker to execute arbitrary commands on the fundamental operating program with the privileges of the management framework system, which are typically root privileges.”

Uncovered this write-up appealing? Comply with THN on Fb, Twitter  and LinkedIn to read more special content material we write-up.


Some elements of this post are sourced from:
thehackernews.com

Previous Post: «critical cisco staros bug grants root access via debug mode Critical Cisco StarOS Bug Grants Root Access via Debug Mode
Next Post: U.S. Sanctions 4 Ukrainians for Working with Russia to Destabilize Ukraine u.s. sanctions 4 ukrainians for working with russia to destabilize»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Dev Sabotages Popular NPM Package to Protest Russian Invasion
  • Phishers Using Ukraine Invasion to Solicit Cryptocurrency
  • Hackers spotted using CAPTCHAs to dodge email security scanners
  • FBI Launches Virtual Assets Unit
  • The Total Economic Impact™ of IBM Security MaaS360 with Watson
  • Unified endpoint management solutions 2021-22
  • Misconfigured Firebase Databases Exposing Data in Mobile Apps
  • Six myths of SIEM
  • US Passes “Game-Changing” Cyber Incident Reporting Legislation
  • How a platform approach to security monitoring initiatives adds value

Copyright © TheCyberSecurity.News, All Rights Reserved.