Cisco plans to release a patch for two zero-day flaws in its IOS XE devices on October 22. The first Cisco zero-day bug, which is named CVE-2023-20198, was reported on Oct. 16. By the time it was found, it had already been used by attackers to compromise over 10,000 Cisco devices. Cisco believes that all cyberattacks on its IOS XE devices are being perpetrated by the same threat actor.
Cisco recently updated its threat advisory on Oct. 20. They identified a new flaw, referred to as CVE-2023-20273, which was previously unknown. The flaw has a CVSS score of 7.2, which is slightly less severe. Both bugs are part of the same exploit chain.
By infosecbulletin
/ Friday , November 22 2024
A study by Censys found that more than 145,000 Industrial Control Systems (ICS) are exposed online in 175 countries, highlighting...
Read More
By infosecbulletin
/ Friday , November 22 2024
Osaka-based showerhead maker Science Co. is developing a new version of human washing machine based on cutting-edge technology. The company...
Read More
By infosecbulletin
/ Friday , November 22 2024
Over 2,000 Palo Alto Networks firewalls have been compromised in a widespread attack using two recently patched vulnerabilities (CVE-2024-0012 and...
Read More
By infosecbulletin
/ Thursday , November 21 2024
Renowned cybersecurity researcher Jeremiah Fowler uncovered a non-password-protected database having over 1.1 million records linked to Conduitor Limited (Forces Penpals)....
Read More
By infosecbulletin
/ Wednesday , November 20 2024
Trend Micro released a security update for Deep Security 20 Agent Manual Scan Command Injection RCE Vulnerability (CVE-2024-51503) that resolves...
Read More
By infosecbulletin
/ Wednesday , November 20 2024
Apple released critical updates for its various products including for iOS, iPadOS, macOS, visionOS, and Safari to fix two zero-day...
Read More
By infosecbulletin
/ Tuesday , November 19 2024
Maxar Space Systems has verified a major data breach that exposed particular information of current and former workers. The breach...
Read More
By infosecbulletin
/ Tuesday , November 19 2024
A security vulnerability (CVE-2024-52308) in the GitHub Command Line Interface (CLI) could allow remote code execution on users' devices. With...
Read More
By infosecbulletin
/ Tuesday , November 19 2024
“Sarcoma” ransomware group attacked a well known Bangladeshi insurance company named "Popular life insurance company ltd". The threat actor keeps...
Read More
By infosecbulletin
/ Monday , November 18 2024
Bug Hunt 2024, one of the largest cyber security competitions and conferences in Bangladesh, was successfully held at the ICT...
Read More
Attackers used the first bug to gain initial access, and the second bug to escalate privileges after authentication, as stated in an email from Cisco announcing the upcoming patch release.
Cisco has clarified that they made a mistake in their earlier report about the bug. Initially, they thought the threat actor had combined a new zero-day with a patched vulnerability from 2021, which could have allowed the attacker to bypass the patch.
However, Cisco has now dismissed this theory. They stated this in a company statement. “The CVE-2021-1435 that had previously been mentioned is no longer assessed to be associated with this activity,” it said.
ALSO READ:
Chinese scammers exploit India’s digital payment ecosystem