Monday, 12 Jan 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Security > Cisco Zero-Day Under Fire From Threat Group
Security

Cisco Zero-Day Under Fire From Threat Group

Last updated: July 3, 2024 12:50 pm
Published July 3, 2024
Share
Cisco Zero-Day Under Fire From Threat Group
SHARE

This article originally appeared in Dark Reading.

Cisco has patched a command-line injection flaw in a community administration platform used to handle switches in information facilities, which, in line with researchers from Sygnia, has already been exploited by the China-backed risk group generally known as Velvet Ant.

The bug (CVE-2024-20399) can permit authenticated attackers to execute arbitrary command as root on the underlying working system of an affected gadget. It is discovered within the command line interface (CLI) of Cisco NX-OS Software program, which permits information middle operations managers to troubleshoot and carry out upkeep operations on NX-OS-enabled gadgets, which use the Linux kernel at their core.

“This vulnerability is because of inadequate validation of arguments which might be handed to particular configuration CLI instructions,” in line with Cisco’s advisory on the flaw. “An attacker may exploit this vulnerability by together with crafted enter because the argument of an affected configuration CLI command.”

The flaw includes a bash-shell function that’s accessible on all supported Cisco NX-OS Software program releases for Cisco Nexus collection switches and another merchandise, in line with Cisco.

If a tool is operating a Cisco NX-OS Software program launch that doesn’t assist the bash-shell function, a person with admin privileges may exploit this vulnerability to execute arbitrary instructions on the underlying OS. If a tool is operating a Cisco NX-OS Software program launch that helps the bash-shell function, an admin person can entry the underlying OS immediately utilizing the function.

Associated:AMD Investigates Potential Cyber-Assault by IntelBroker Hacking Group

The flaw impacts the next Cisco gadgets: MDS 9000 Sequence Multilayer Switches, Nexus 3000 Sequence Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Sequence Switches, Nexus 7000 Sequence Switches, and Nexus 9000 Sequence Switches in standalone NX-OS mode. Cisco has launched updates that patch the flaw within the affected gadgets, it stated.

See also  Examining the major AI security threat

As a result of an attacker should have admin credentials to take advantage of CVE-2024-20399, the flaw is rated solely medium danger – besides, it is already being exploited, so patching it ought to take precedence.

Velvet Ant Swarms on CVE-2024-20399

Certainly, the 6.0 CVSS ranking did not cease Velvet Ant from exploiting the flaw to execute arbitrary instructions on the underlying Linux OS of a Cisco Nexus swap by utilizing legitimate administrator credentials to the Change administration console, in line with a blog post by the Sygnia team.

NX-OS is predicated on a Linux kernel; nevertheless, it abstracts away the underlying Linux setting and supplies its personal set of instructions utilizing the NX-OS CLI, in line with the submit. Thus, “to be able to execute instructions on the underlying Linux working system from the Change administration console, an attacker would want a ‘jailbreak’ sort of vulnerability to flee the NX-OS CLI context,” which CVE-2024-20399 supplies, in line with Sygnia.

Associated:Utility SLAs within the Cloud: A Large Swindle?

Velvet Ant’s exploitation of the flaw – a part of a multiyear campaign revealed by Sygnia and reported by Darkish Studying in June – “led to the execution of a beforehand unknown {custom} malware that allowed the risk group to remotely hook up with compromised Cisco Nexus gadgets, add extra information, and execute code on the gadgets,” the Sygnia crew wrote.

Hopping on Cisco flaws is a favourite pastime of nation-state cyberattackers: For instance, an unrelated assault marketing campaign dubbed ArcaneDoor recognized in April additionally focused Cisco gadgets to ship two custom-built backdoors by exploiting zero-day flaws to focus on the perimeter of presidency networks inside a worldwide cyber-espionage marketing campaign.

See also  DigitalBridge Completes Yondr Group Acquisition

Patch Now to Mitigate Additional Cisco Vuln Danger

Cisco Nexus switches are prevalent in enterprise environments, particularly inside information facilities, and are not sometimes uncovered to the Web. However gaining legitimate admin-level credentials and community entry to these gadgets is a horny proposition for superior persistent threats (APTs) like Velvet Ant, which have a tendency to focus on unguarded switches and different community home equipment to realize persistence and execute instructions throughout cyberattacks, in line with Sygnia.

Meaning affected organizations ought to comply with Cisco’s directions for patching any susceptible gadgets current on a community. Organizations can use Cisco’s Software Checker to see if their environments are susceptible.

“Regardless of the substantial stipulations for exploiting the mentioned vulnerability, this incident demonstrates the tendency of refined risk teams to leverage community home equipment – which are sometimes not sufficiently protected and monitored – to keep up persistent community entry,” the Sygnia crew wrote.

Harden Community Environments

The incident additionally highlights the “essential significance of adhering to safety finest practices as a mitigation in opposition to any such risk,” in line with Sygnia, which advisable that organizations harden their environments in a wide range of methods.

These suggestions embody proscribing administrator entry to community gear by utilizing a privileged access management (PAM) resolution or a devoted, hardened, soar server with multifactor authentication (MFA) enforced. Organizations can also use central authentication, authorization, and accounting administration for customers to assist streamline and improve safety, particularly in environments with quite a few switches.

Community directors additionally ought to prohibit switches from initiating outbound connections to the Web to scale back the chance of them being exploited by exterior threats, or used to speak with malicious actors.

See also  Microsoft and OpenAI say hackers are using ChatGPT to improve cyberattacks

Lastly, as a common rule, organizations additionally ought to implement a powerful password coverage and keep good password hygiene so passwords do not fall into the flawed palms, in line with Sygnia, in addition to keep regular patch schedules to replace gadgets and keep away from leaving them susceptible.



Source link

Contents
Velvet Ant Swarms on CVE-2024-20399Patch Now to Mitigate Additional Cisco Vuln DangerHarden Community Environments
TAGGED: Cisco, Fire, Group, Threat, zeroday
Share This Article
Twitter Email Copy Link Print
Previous Article Waterland Private Equity partners with Black & White Engineering Waterland Private Equity partners with Black & White Engineering
Next Article AI expansion vs achieving climate goals AI expansion vs achieving climate goals
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

SendBlocks Raises $8.2M in Seed Funding

SendBloks, a Tel Aviv, Israel-based startup in blockchain knowledge administration, raised $8.2M in Seed funding.…

July 7, 2024

AI Computing Is on Pace to Consume More Energy Than India, Arm Says | DCN

(Bloomberg) -- AI’s voracious want for computing energy is threatening to overwhelm power sources, requiring…

April 17, 2024

Expanding horizons with India’s NVIDIA DGX-Ready MAA10 facility

Digital Connexion, a full-service supplier of information centre options, not too long ago introduced that…

August 7, 2025

Zayo’s 622-Mile Fiber Route Links Western Data Centers

Denver-based infrastructure supplier Zayo on Wednesday stated a brand new 622-mile long-haul fiber route has…

November 12, 2025

Clare&me Raises $4M in Funding

Clare&me, a Berlin, Germany-based AI psychological well being tech startup, raised $4M in funding. The…

August 9, 2024

You Might Also Like

Cisco building exterior with sign
Global Market

Cisco routers knocked out due to Cloudflare DNS change

By saad
Cisco
Global Market

Cisco identifies vulnerability in ISE network access control devices

By saad
Futuristic cyber hacker operating under the guise of Anonymous, employs advanced algorithms to infiltrate cybersecurity systems and exploit vulnerabilities in password security. Concept : Cyber Hacker
Global Market

Attackers bring their own passwords to Cisco and Palo Alto VPNs

By saad
System warning caution sign on smartphone, scam virus attack on firewall for notification error and maintenance. Network security vulnerability, data breach, illegal connection and information danger.
Global Market

WatchGuard fixes ‘critical’ zero-day allowing firewall takeover

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.