• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisco issues urgent fix for authentication bypass bug affecting broadworks

Cisco Issues Urgent Fix for Authentication Bypass Bug Affecting BroadWorks Platform

You are here: Home / General Cyber Security News / Cisco Issues Urgent Fix for Authentication Bypass Bug Affecting BroadWorks Platform
September 8, 2023

Cisco has released security fixes to tackle numerous security flaws, like a critical bug, that could be exploited by a risk actor to consider handle of an afflicted system or trigger a denial-of provider (DoS) affliction.

The most intense of the issues is CVE-2023-20238, which has the maximum CVSS severity rating of 10.. It is really explained as an authentication bypass flaw in the Cisco BroadWorks Application Shipping System and Cisco BroadWorks Xtended Providers System.

Thriving exploitation of the bug, a weak point in the solitary indicator-on (SSO) implementation and discovered during inner testing, could allow for an unauthenticated, remote attacker to forge the credentials necessary to obtain an influenced system.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“This vulnerability is due to the technique utilised to validate SSO tokens,” Cisco said. “An attacker could exploit this vulnerability by authenticating to the software with solid qualifications. A productive exploit could allow the attacker to dedicate toll fraud or to execute commands at the privilege amount of the cast account.”

“If that account is an Administrator account, the attacker would have the potential to look at confidential facts, modify shopper options, or modify configurations for other buyers. To exploit this vulnerability, the attacker would require a valid user ID that is associated with an impacted Cisco BroadWorks technique.”

The issue, per the business, impacts the two BroadWorks releases and have 1 of the pursuing applications enabled: AuthenticationService, BWCallCenter, BWReceptionist, CustomMediaFilesRetrieval, ModeratorClientApp, PublicECLQuery, PublicReporting, UCAPI, Xsi-Actions, Xsi-Occasions, Xsi-MMTel, or Xsi-VTR.

Cybersecurity

Fixes for the vulnerability are readily available in model AP.system.23..1075.ap385341, 2023.06_1.333, and 2023.07_1.332.

Also fixed by Cisco is a higher-severity flaw in the RADIUS message processing characteristic of Cisco Id Products and services Motor (CVE-2023-20243, CVSS rating: 8.6) that could enable an unauthenticated, remote attacker to cause the afflicted method to halt processing RADIUS packets.

“This vulnerability is thanks to poor managing of selected RADIUS accounting requests,” Cisco stated. “A productive exploit could let the attacker to lead to the RADIUS course of action to unexpectedly restart, ensuing in authentication or authorization timeouts and denying reputable buyers entry to the network or support.”

CVE-2023-20243 impacts variations 3.1 and 3.2 of Cisco Identity Companies Engine. It has been patched in versions 3.1P7 and 3.2P3. Other versions of the products are not susceptible.

Juniper Networks Addresses Intense BGP Flaw with Out-of-Band Update

The advisories occur days immediately after Juniper Networks shipped an out-of-band update for an inappropriate input validation flaw in the Routing Protocol Daemon (rpd) of Junos OS and Junos OS Developed, which will allow an unauthenticated, network-based mostly attacker to bring about a DoS condition.

The vulnerability impacts a number of Border Gateway Protocol (BGP) implementations, for each security researcher Ben Cartwright-Cox, who designed the discovery. Juniper Networks is monitoring it as CVE-2023-4481 (CVSS score: 7.5), FRRouting as CVE-2023-38802, and OpenBSD OpenBGPd as CVE-2023-38283.

“When particular unique crafted BGP UPDATE messages are obtained above an established BGP session, just one BGP session may be torn down with an UPDATE concept mistake, or the issue may well propagate past the community procedure which will remain non-impacted, but may well affect 1 or more distant systems,” Juniper Networks explained.

Future WEBINARWay Also Vulnerable: Uncovering the State of the Identity Attack Surface area

Reached MFA? PAM? Provider account safety? Obtain out how effectively-equipped your group definitely is versus identity threats

Supercharge Your Competencies

“This issue is exploitable remotely as the crafted UPDATE concept can propagate by unaffected devices and intermediate BGP speakers. Continuous receipt of the crafted BGP UPDATE messages will develop a sustained denial-of-assistance (DoS) ailment for impacted gadgets.”

On the other hand for the attack to be successful, a distant attacker is needed to have at least a person proven BGP session. The vulnerability has been preset in Junos OS 23.4R1 and Junos OS Developed 23.4R1-EVO.

Unpatched Tenda Modem Router Vulnerability

In a similar growth, CERT Coordination Heart (CERT/CC) in-depth an unpatched authentication bypass vulnerability in Tenda’s N300 Wi-fi N VDSL2 Modem Router (CVE-2023-4498, ) that could lets a remote, unauthenticated user to accessibility delicate details via a specially crafted request.

“Productive exploitation of this vulnerability could grant the attacker obtain to web pages that would if not call for authentication,” CERT/CC stated. “An unauthenticated attacker could therefore gain accessibility to sensitive facts, these as the Administrative password, which could be applied to start added attacks.”

In the absence of a security update, it truly is recommended that end users disable each the remote (WAN-side) administration companies and the web interface on the WAN on any SoHo router.

Located this article fascinating? Abide by us on Twitter  and LinkedIn to examine extra distinctive written content we submit.


Some areas of this posting are sourced from:
thehackernews.com

Previous Post: «north korean hackers exploit zero day bug to target cybersecurity researchers North Korean Hackers Exploit Zero-Day Bug to Target Cybersecurity Researchers
Next Post: Protecting Your Microsoft IIS Servers Against Malware Attacks protecting your microsoft iis servers against malware attacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.