Friday, 10 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Security > Cisco Zero-Day Under Fire From Threat Group
Security

Cisco Zero-Day Under Fire From Threat Group

Last updated: July 3, 2024 12:50 pm
Published July 3, 2024
Share
Cisco Zero-Day Under Fire From Threat Group
SHARE

This article originally appeared in Dark Reading.

Cisco has patched a command-line injection flaw in a community administration platform used to handle switches in information facilities, which, in line with researchers from Sygnia, has already been exploited by the China-backed risk group generally known as Velvet Ant.

The bug (CVE-2024-20399) can permit authenticated attackers to execute arbitrary command as root on the underlying working system of an affected gadget. It is discovered within the command line interface (CLI) of Cisco NX-OS Software program, which permits information middle operations managers to troubleshoot and carry out upkeep operations on NX-OS-enabled gadgets, which use the Linux kernel at their core.

“This vulnerability is because of inadequate validation of arguments which might be handed to particular configuration CLI instructions,” in line with Cisco’s advisory on the flaw. “An attacker may exploit this vulnerability by together with crafted enter because the argument of an affected configuration CLI command.”

The flaw includes a bash-shell function that’s accessible on all supported Cisco NX-OS Software program releases for Cisco Nexus collection switches and another merchandise, in line with Cisco.

If a tool is operating a Cisco NX-OS Software program launch that doesn’t assist the bash-shell function, a person with admin privileges may exploit this vulnerability to execute arbitrary instructions on the underlying OS. If a tool is operating a Cisco NX-OS Software program launch that helps the bash-shell function, an admin person can entry the underlying OS immediately utilizing the function.

Associated:AMD Investigates Potential Cyber-Assault by IntelBroker Hacking Group

The flaw impacts the next Cisco gadgets: MDS 9000 Sequence Multilayer Switches, Nexus 3000 Sequence Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Sequence Switches, Nexus 7000 Sequence Switches, and Nexus 9000 Sequence Switches in standalone NX-OS mode. Cisco has launched updates that patch the flaw within the affected gadgets, it stated.

See also  Enterprise Data Center (EDC) Market Analysis and Revenue Prediction | Cisco, HP, IBM

As a result of an attacker should have admin credentials to take advantage of CVE-2024-20399, the flaw is rated solely medium danger – besides, it is already being exploited, so patching it ought to take precedence.

Velvet Ant Swarms on CVE-2024-20399

Certainly, the 6.0 CVSS ranking did not cease Velvet Ant from exploiting the flaw to execute arbitrary instructions on the underlying Linux OS of a Cisco Nexus swap by utilizing legitimate administrator credentials to the Change administration console, in line with a blog post by the Sygnia team.

NX-OS is predicated on a Linux kernel; nevertheless, it abstracts away the underlying Linux setting and supplies its personal set of instructions utilizing the NX-OS CLI, in line with the submit. Thus, “to be able to execute instructions on the underlying Linux working system from the Change administration console, an attacker would want a ‘jailbreak’ sort of vulnerability to flee the NX-OS CLI context,” which CVE-2024-20399 supplies, in line with Sygnia.

Associated:Utility SLAs within the Cloud: A Large Swindle?

Velvet Ant’s exploitation of the flaw – a part of a multiyear campaign revealed by Sygnia and reported by Darkish Studying in June – “led to the execution of a beforehand unknown {custom} malware that allowed the risk group to remotely hook up with compromised Cisco Nexus gadgets, add extra information, and execute code on the gadgets,” the Sygnia crew wrote.

Hopping on Cisco flaws is a favourite pastime of nation-state cyberattackers: For instance, an unrelated assault marketing campaign dubbed ArcaneDoor recognized in April additionally focused Cisco gadgets to ship two custom-built backdoors by exploiting zero-day flaws to focus on the perimeter of presidency networks inside a worldwide cyber-espionage marketing campaign.

See also  Ardent Data Centers, a Northern Data Group company, completes acquisition of Pennsylvania data center -January 22, 2024 at 08:09 am EST

Patch Now to Mitigate Additional Cisco Vuln Danger

Cisco Nexus switches are prevalent in enterprise environments, particularly inside information facilities, and are not sometimes uncovered to the Web. However gaining legitimate admin-level credentials and community entry to these gadgets is a horny proposition for superior persistent threats (APTs) like Velvet Ant, which have a tendency to focus on unguarded switches and different community home equipment to realize persistence and execute instructions throughout cyberattacks, in line with Sygnia.

Meaning affected organizations ought to comply with Cisco’s directions for patching any susceptible gadgets current on a community. Organizations can use Cisco’s Software Checker to see if their environments are susceptible.

“Regardless of the substantial stipulations for exploiting the mentioned vulnerability, this incident demonstrates the tendency of refined risk teams to leverage community home equipment – which are sometimes not sufficiently protected and monitored – to keep up persistent community entry,” the Sygnia crew wrote.

Harden Community Environments

The incident additionally highlights the “essential significance of adhering to safety finest practices as a mitigation in opposition to any such risk,” in line with Sygnia, which advisable that organizations harden their environments in a wide range of methods.

These suggestions embody proscribing administrator entry to community gear by utilizing a privileged access management (PAM) resolution or a devoted, hardened, soar server with multifactor authentication (MFA) enforced. Organizations can also use central authentication, authorization, and accounting administration for customers to assist streamline and improve safety, particularly in environments with quite a few switches.

Community directors additionally ought to prohibit switches from initiating outbound connections to the Web to scale back the chance of them being exploited by exterior threats, or used to speak with malicious actors.

See also  Cisco extends Nexus 9000 support to Intel Gaudi 3 AI accelerators

Lastly, as a common rule, organizations additionally ought to implement a powerful password coverage and keep good password hygiene so passwords do not fall into the flawed palms, in line with Sygnia, in addition to keep regular patch schedules to replace gadgets and keep away from leaving them susceptible.



Source link

Contents
Velvet Ant Swarms on CVE-2024-20399Patch Now to Mitigate Additional Cisco Vuln DangerHarden Community Environments
TAGGED: Cisco, Fire, Group, Threat, zeroday
Share This Article
Twitter Email Copy Link Print
Previous Article Waterland Private Equity partners with Black & White Engineering Waterland Private Equity partners with Black & White Engineering
Next Article AI expansion vs achieving climate goals AI expansion vs achieving climate goals
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

IOTech to offer enhanced usability for open edge solutions via Edge Central 3.1 release

IOTech, an open edge computing answer supplier, has introduced the overall availability of Edge Central…

March 29, 2024

Investing in Data Centers? Throw Out Your RE Playbook. And Your PE Playbook, Too

Within the fiercely aggressive knowledge heart (DC) funding panorama and the brand new playbook of…

June 11, 2024

Prehistoric basketweaving inspires new materials for stiff, resilient robots

A prototype for a woven robotic that resembles a canine can stand up to 25…

August 30, 2025

Mavenir Receives Up To $75M Investment

Mavenir, a Richardson, TX-based cloud-native community infrastructure supplier, raised as much as $75M in funding.…

June 1, 2024

Zero Trust made simple | Network World

Who hasn’t heard about Zero Belief? Undoubtedly one of many hottest buzzwords lately, and on…

February 20, 2024

You Might Also Like

Security, laser shield
Global Market

Cisco joins Anthropic’s multivendor effort to secure AI software

By saad
Virtualization Cloud 16z9
Global Market

Cisco extends its Enterprise Agreement to include Nutanix Cloud Platform

By saad
3D zero-day vulnerability refers to a security flaw in software
Global Market

Vim and GNU Emacs: Claude Code helpfully found zero-day exploits for both

By saad
Cisco building exterior with sign
Global Market

Cisco fixes critical IMC auth bypass present in many products

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.