Cisco Systems has rolled out fixes for a critical security flaw influencing Redundancy Configuration Supervisor (RCM) for Cisco StarOS Software package that could be weaponized by an unauthenticated, distant attacker to execute arbitrary code and get about vulnerable machines.
Tracked as CVE-2022-20649 (CVSS score: 9.), the vulnerability stems from the actuality that the debug manner has been incorrectly enabled for unique expert services.
“An attacker could exploit this vulnerability by connecting to the machine and navigating to the assistance with debug manner enabled,” Cisco mentioned in an advisory. “A effective exploit could permit the attacker to execute arbitrary commands as the root consumer.”
Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
The network equipment maker, nevertheless, famous that the adversary would need to execute in-depth reconnaissance to permit for unauthenticated access to vulnerable devices.
Stating that the vulnerability was found for the duration of interior security screening, Cisco additional it observed no proof of active exploitation in destructive attacks.
On prime of this, the firm also remediated a range of other flaws —
- CVE-2022-20648 (CVSS score: 5.3) – Cisco RCM Debug Information and facts Disclosure Vulnerability
- CVE-2022-20685 (CVSS rating: 7.5) – Various Cisco Merchandise Snort Modbus Denial of Service Vulnerability
- CVE-2022-20655 (CVSS rating: 8.8) – ConfD CLI Command Injection Vulnerability
Cisco described that CVE-2022-20655 is due to an “insufficient validation of a method argument” on an influenced machine.
“An attacker could exploit this vulnerability by injecting commands for the duration of the execution of this procedure,” it claimed. “A profitable exploit could allow for the attacker to execute arbitrary commands on the fundamental operating program with the privileges of the management framework system, which are typically root privileges.”
Uncovered this write-up appealing? Comply with THN on Fb, Twitter and LinkedIn to read more special content material we write-up.
Some elements of this post are sourced from:
thehackernews.com