fbpx

Cisco bug lets hackers run commands as root on UWRB access points

by Wire Tech

Cisco has fixed a maximum severity vulnerability that allows attackers to run commands with root privileges on vulnerable Ultra-Reliable Wireless Backhaul (URWB) access points that provide connectivity for industrial wireless automation.

Tracked as CVE-2024-20418, this security flaw was found in Cisco’s Unified Industrial Wireless Software’s web-based management interface. Unauthenticated threat actors can exploit it in low-complexity command injection attacks that don’t require user interaction.

"This vulnerability is due to improper validation of input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system," Cisco said in a security advisory published on Wednesday.

"A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system of the affected device."

As the company explains, the vulnerability impacts Catalyst IW9165D Heavy Duty Access Points, Catalyst IW9165E Rugged Access Points and Wireless Clients, and Catalyst IW9167E Heavy Duty Access Points, but only if they're running vulnerable software and have the URWB operating mode enabled.

Cisco's Product Security Incident Response Team (PSIRT) has yet to discover evidence of publicly available exploit code or that this critical security flaw has been exploited in attacks.

Admins can determine if the URWB operating mode is enabled by checking if the "show mpls-config" CLI command is available. If the command is not available, URWB is disabled, and the device will not be affected by this vulnerability.

Cisco also fixed a denial-of-service flaw in its Cisco ASA and Firepower Threat Defense (FTD) software in July, which was discovered in April while exploited in large-scale brute-force attacks targeting Cisco VPN devices.

One month earlier, the company released security updates to address another command injection vulnerability with public exploit code that lets attackers escalate privileges to root on vulnerable systems.

​In July, CISA and the FBI urged software companies to eliminate path OS command injection vulnerabilities before shipping in response to recent attacks where Cisco, Palo Alto, and Ivanti network edge devices were compromised by exploiting multiple OS command injection security flaws (CVE-2024-20399, CVE-2024-3400, and CVE-2024-21887).

Related Articles:

Cisco fixes VPN DoS flaw discovered in password spray attacks

Cisco says DevHub site leak won’t enable future breaches

Hackers target critical zero-day vulnerability in PTZ cameras

Massive PSAUX ransomware attack targets 22,000 CyberPanel instances

New Cisco ASA and FTD features block VPN brute-force password attacks

________________________________________________________________________________________________________________________________
Original Article Published at Bleeping Computer
________________________________________________________________________________________________________________________________

You may also like

Leave a Comment

Unlock the Power of Technology with Tech-Wire: The Ultimate Resource for Computing, Cybersecurity, and Mobile Technology Insights

Copyright @2023 All Right Reserved