Friday , November 1 2024

CISCO Zero-Day Vulnerabilities exploitation in Bangladesh

The Cyber Threat Intelligence team of BGD e-GOV CIRT has issued a warning about ongoing attacks using two zero-day vulnerabilities in Cisco’s IOS XE Software web UI feature. Successful exploitation attempts have been observed against organizations in Bangladesh. This advisory is intended for IT teams responsible for configuring and managing routers and network switches in their organizations.

1. CVE-2023-20198 (Critical | CVSS: 10.0): Remote attackers can create local user accounts, which poses a serious risk of privilege escalation.

Bangladesh Kubernetes User Group Meetup successfully completed

Meetup of Bangladesh Kubernetes User Group was held at Banani Club 9294, Dhaka on Thursday, 31 October 2024. A lively...
Read More
Bangladesh Kubernetes User Group Meetup successfully completed

Bangladesh Bank issues cyber threat alert

Bangladesh Bank issues alert on cyber threat. In its alert the central bank said, according to Bangladesh cyber security intelligence...
Read More
Bangladesh Bank issues cyber threat alert

Hacker claim data breach: bank confirms blaming third party

Interbank, a major financial institution in Peru, has confirmed a data breach after a hacker leaked stolen data online. Formerly...
Read More
Hacker claim data breach: bank confirms blaming third party

CISA Launches Its First Ever International Strategic Plan

The US Cybersecurity and Infrastructure Security Agency (CISA) has released its first international strategic plan to enhance global cooperation in...
Read More
CISA Launches Its First Ever International Strategic Plan

Rented bank account used to illegal transection: 5 arrested

The Indian Cyber Crime Coordination Centre (I4C) has warned about illegal payment gateways set up by transnational cyber criminals using...
Read More
Rented bank account used to illegal transection: 5 arrested

Successfully held “InfoSecCon-2024″at Dhaka Bangladesh

With a festive look and the participation of more than one hundred participants from Bangladesh cyber industry, another successful cyber...
Read More
Successfully held “InfoSecCon-2024″at Dhaka Bangladesh

Bangladeshi hacker hack for girlfriend’s expenses; finally caught

Fazle Hassan Anik hacked girls' Facebook accounts to steal sensitive pictures, which he used to blackmail them for money. He...
Read More
Bangladeshi hacker hack for girlfriend’s expenses; finally caught

Bangladeshi Social media flooded with unauthorized withdrawals from bank accounts

Bangladeshi Social media posts have raised concerns about unauthorized withdrawals from bank accounts, affecting at least 7 to 8 people...
Read More
Bangladeshi Social media flooded with unauthorized withdrawals from bank accounts

Unprotected UN Database Exposes 228GB of Gender Violence Victims’ Data

Cybersecurity researcher Jeremiah Fowler found a non-password-protected database with 115,000 records linked to the UN Trust Fund to End Violence...
Read More
Unprotected UN Database Exposes 228GB of Gender Violence Victims’ Data

Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability

Cisco announced updates on Wednesday to fix a security flaw in its Adaptive Security Appliance (ASA) that is currently being...
Read More
Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability

2. CVE-2023-20273 (Medium | CVSS: 7.2): It allows for higher privileges and injection of malicious implants, in addition to the initial vulnerability.

Scope & Impact:
Affected Systems: All Cisco IOS XE Software with Web UI enabled.

Risk Level:  Critical

Potential Impact: 

Unauthorized intruders are redirecting and injecting implants, causing security breaches in network traffic.

Recommendations
To determine if a device might be compromised, consider the following actions:

1. Examine Log Messages:

Review system logs for specific log entries involving unfamiliar local users, including:

* %SYS-5-CONFIG_P: Configuration modifications made by certain processes as “user.”
* %SEC_LOGIN-5-WEBLOGIN_SUCCESS: Records of successful web logins, including user and
source IP details.
* %WEBUI-6-INSTALL_OPERATION_INFO: Instances of user-initiated installations for unknown
filenames.

2. Detect Malicious Implant:

To detect a malicious implant on possibly compromised Cisco IOS XE devices, use the following command: replace “DEVICEIP” with the IP address of the device you want to target.

Use a curl command to find systems that have known implant variants without activating the implant’s main functions. You can use %25 (percent-encoded percent) to get different responses. If the response includes a 404 HTTP error and a “404 Not Found” message, it indicates a recognized implant variation. Systems without the implant will either give a normal 404 HTTP response or a JavaScript redirect with a 200 HTTP response.

If the implant is present, you will get a response similar to the following:

If the implant is not present, you will get a different response. For example:

$ curl -k ‘https://DEVICEIP/%25′
<script>window.onload=function(){ url =’/webui’;window.location.href=url;}</script>

Please note:
When inspecting devices with insecure web interfaces, apply the HTTP scheme.


Mitigations

Cisco has released software updates to fix the vulnerabilities mentioned in this advisory. Customers with service agreements can get the security patches through their usual update sources. More information can be found in the Cisco advisory at this link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosx

Check Also

Internet archive

2nd time hacker breached Internet Archive

The Internet Archive was breached again, this time through their Zendesk email support platform, following …

Leave a Reply

Your email address will not be published. Required fields are marked *