Cisco on Friday rolled out fixes for a medium-severity vulnerability impacting IOS XR Software package that it reported has been exploited in true-environment attacks.
Tracked as CVE-2022-20821 (CVSS score: 6.5), the issue relates to an open up port vulnerability that could be abused by an unauthenticated, remote attacker to hook up to a Redis occasion and achieve code execution.
“A productive exploit could allow the attacker to publish to the Redis in-memory database, generate arbitrary files to the container filesystem, and retrieve info about the Redis databases,” Cisco explained in an advisory.
Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
“Specified the configuration of the sandboxed container that the Redis instance operates in, a remote attacker would be unable to execute distant code or abuse the integrity of the Cisco IOS XR Application host system.”
The flaw, which it explained was identified through the resolution of a technical aid center (TAC) circumstance, impacts Cisco 8000 Collection routers working IOS XR Software program that has the wellness check RPM mounted and energetic.
The networking gear maker also cautioned that it truly is informed of the tried exploitation of the zero-day bug previously this thirty day period. “Cisco strongly recommends that clients utilize suitable workarounds or enhance to a fastened software package release to remediate this vulnerability,” it included.
Located this post appealing? Abide by THN on Fb, Twitter and LinkedIn to study a lot more exclusive information we post.
Some parts of this article are sourced from:
thehackernews.com