Saturday, 28 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Security > Cisco Zero-Day Under Fire From Threat Group
Security

Cisco Zero-Day Under Fire From Threat Group

Last updated: July 3, 2024 12:50 pm
Published July 3, 2024
Share
Cisco Zero-Day Under Fire From Threat Group
SHARE

This article originally appeared in Dark Reading.

Cisco has patched a command-line injection flaw in a community administration platform used to handle switches in information facilities, which, in line with researchers from Sygnia, has already been exploited by the China-backed risk group generally known as Velvet Ant.

The bug (CVE-2024-20399) can permit authenticated attackers to execute arbitrary command as root on the underlying working system of an affected gadget. It is discovered within the command line interface (CLI) of Cisco NX-OS Software program, which permits information middle operations managers to troubleshoot and carry out upkeep operations on NX-OS-enabled gadgets, which use the Linux kernel at their core.

“This vulnerability is because of inadequate validation of arguments which might be handed to particular configuration CLI instructions,” in line with Cisco’s advisory on the flaw. “An attacker may exploit this vulnerability by together with crafted enter because the argument of an affected configuration CLI command.”

The flaw includes a bash-shell function that’s accessible on all supported Cisco NX-OS Software program releases for Cisco Nexus collection switches and another merchandise, in line with Cisco.

If a tool is operating a Cisco NX-OS Software program launch that doesn’t assist the bash-shell function, a person with admin privileges may exploit this vulnerability to execute arbitrary instructions on the underlying OS. If a tool is operating a Cisco NX-OS Software program launch that helps the bash-shell function, an admin person can entry the underlying OS immediately utilizing the function.

Associated:AMD Investigates Potential Cyber-Assault by IntelBroker Hacking Group

The flaw impacts the next Cisco gadgets: MDS 9000 Sequence Multilayer Switches, Nexus 3000 Sequence Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Sequence Switches, Nexus 7000 Sequence Switches, and Nexus 9000 Sequence Switches in standalone NX-OS mode. Cisco has launched updates that patch the flaw within the affected gadgets, it stated.

See also  Apple says Siri isn’t sending your conversations to advertisers

As a result of an attacker should have admin credentials to take advantage of CVE-2024-20399, the flaw is rated solely medium danger – besides, it is already being exploited, so patching it ought to take precedence.

Velvet Ant Swarms on CVE-2024-20399

Certainly, the 6.0 CVSS ranking did not cease Velvet Ant from exploiting the flaw to execute arbitrary instructions on the underlying Linux OS of a Cisco Nexus swap by utilizing legitimate administrator credentials to the Change administration console, in line with a blog post by the Sygnia team.

NX-OS is predicated on a Linux kernel; nevertheless, it abstracts away the underlying Linux setting and supplies its personal set of instructions utilizing the NX-OS CLI, in line with the submit. Thus, “to be able to execute instructions on the underlying Linux working system from the Change administration console, an attacker would want a ‘jailbreak’ sort of vulnerability to flee the NX-OS CLI context,” which CVE-2024-20399 supplies, in line with Sygnia.

Associated:Utility SLAs within the Cloud: A Large Swindle?

Velvet Ant’s exploitation of the flaw – a part of a multiyear campaign revealed by Sygnia and reported by Darkish Studying in June – “led to the execution of a beforehand unknown {custom} malware that allowed the risk group to remotely hook up with compromised Cisco Nexus gadgets, add extra information, and execute code on the gadgets,” the Sygnia crew wrote.

Hopping on Cisco flaws is a favourite pastime of nation-state cyberattackers: For instance, an unrelated assault marketing campaign dubbed ArcaneDoor recognized in April additionally focused Cisco gadgets to ship two custom-built backdoors by exploiting zero-day flaws to focus on the perimeter of presidency networks inside a worldwide cyber-espionage marketing campaign.

See also  Apple Intelligence bug bounty invites researchers to test its privacy claims

Patch Now to Mitigate Additional Cisco Vuln Danger

Cisco Nexus switches are prevalent in enterprise environments, particularly inside information facilities, and are not sometimes uncovered to the Web. However gaining legitimate admin-level credentials and community entry to these gadgets is a horny proposition for superior persistent threats (APTs) like Velvet Ant, which have a tendency to focus on unguarded switches and different community home equipment to realize persistence and execute instructions throughout cyberattacks, in line with Sygnia.

Meaning affected organizations ought to comply with Cisco’s directions for patching any susceptible gadgets current on a community. Organizations can use Cisco’s Software Checker to see if their environments are susceptible.

“Regardless of the substantial stipulations for exploiting the mentioned vulnerability, this incident demonstrates the tendency of refined risk teams to leverage community home equipment – which are sometimes not sufficiently protected and monitored – to keep up persistent community entry,” the Sygnia crew wrote.

Harden Community Environments

The incident additionally highlights the “essential significance of adhering to safety finest practices as a mitigation in opposition to any such risk,” in line with Sygnia, which advisable that organizations harden their environments in a wide range of methods.

These suggestions embody proscribing administrator entry to community gear by utilizing a privileged access management (PAM) resolution or a devoted, hardened, soar server with multifactor authentication (MFA) enforced. Organizations can also use central authentication, authorization, and accounting administration for customers to assist streamline and improve safety, particularly in environments with quite a few switches.

Community directors additionally ought to prohibit switches from initiating outbound connections to the Web to scale back the chance of them being exploited by exterior threats, or used to speak with malicious actors.

See also  Cisco strengthens AWS integration to speed troubleshooting in multicloud environments

Lastly, as a common rule, organizations additionally ought to implement a powerful password coverage and keep good password hygiene so passwords do not fall into the flawed palms, in line with Sygnia, in addition to keep regular patch schedules to replace gadgets and keep away from leaving them susceptible.



Source link

Contents
Velvet Ant Swarms on CVE-2024-20399Patch Now to Mitigate Additional Cisco Vuln DangerHarden Community Environments
TAGGED: Cisco, Fire, Group, Threat, zeroday
Share This Article
Twitter Email Copy Link Print
Previous Article Waterland Private Equity partners with Black & White Engineering Waterland Private Equity partners with Black & White Engineering
Next Article AI expansion vs achieving climate goals AI expansion vs achieving climate goals
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Linux is moving into efficient and flexible manufacturing

Red Hat Linux is taking another plunge forward – one few of us likely imagined.…

February 13, 2024

Nvidia turns to software to speed up its data center networking hardware for AI

Sometimes chunks of AI duties are distributed throughout GPUs, which then coordinate to offer a…

August 23, 2025

Utilize AI to Capitalize on Your Edge – Webinar from Dell Technologies

On this current video presentation, Alison Biers and Chhandomay Mandal, each Director of Advertising Edge…

September 17, 2024

IO River raises $20M to unbundle the edge and challenge CDN lock-in

IO River, an organization that gives the underlying infrastructure for multi-edge and edge decoupling environments,…

January 16, 2026

Can AI Help In Time Management?

As someone who has always struggled with time management, I was curious about the role…

January 29, 2024

You Might Also Like

online shopping, shopping cart
Global Market

Favorable Wi-Fi 7 prices won’t be around for long, Dell’Oro Group warns

By saad
AI-driven technology powers automation and big data workflows, enabling analysis through neural networks and data analytics for business intelligence, predictive insights, and process optimization.
Global Market

Cisco highlights memory costs, Silicon One growth in Q2 recap

By saad
Cisco Silicon One G300 switching silicon
Global Market

Cisco amps up Silicon One line, delivers new systems and optics for AI networking

By saad
Lantronix and Safe Pro bring on-device AI threat detection to defense drones
Edge Computing

Lantronix and Safe Pro bring on-device AI threat detection to defense drones

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.