Article Details

Scrape Timestamp (UTC): 2024-11-07 07:18:03.792

Source: https://thehackernews.com/2024/11/cisco-releases-patch-for-critical-urwb.html

Original Article Text

Click to Toggle View

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems. Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges. Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability has been described as stemming from a lack of input validation to the web-based management interface of the Cisco Unified Industrial Wireless Software. "An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system," Cisco said in an advisory released Wednesday. "A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system of the affected device." The shortcoming impacts following Cisco products in scenarios where the URWB operating mode is enabled - The networking equipment maker emphasized that products that are not operating in URWB mode are not affected by CVE-2024-20418. It said the vulnerability was discovered during internal security testing. It has been addressed in Cisco Unified Industrial Wireless Software version 17.15.1. Users who are on versions 17.14 and earlier are recommended to migrate to a fixed release. Cisco makes no mention of the flaw being actively exploited in the wild. That said, it's essential that users move quickly to apply the latest patches to secure against potential threats.

Daily Brief Summary

MALWARE // Cisco Patches Critical Flaw in Industrial Wireless Systems

Cisco has issued security updates for a critical flaw in Ultra-Reliable Wireless Backhaul Access Points, identified as CVE-2024-20418 with a CVS score of 10.0.

The vulnerability allows remote attackers to execute commands with root privileges via crafted HTTP requests to the web-based management interface.

This specific vulnerability affects Cisco products operating in URWB mode only and does not impact other modes.

It was discovered during Cisco's internal security testing and has been addressed in the Cisco Unified Industrial Wireless Software version 17.15.1.

Users utilizing software versions 17.14 or earlier are advised to update immediately to avoid potential exploitation.

Cisco confirms there is currently no evidence of the security flaw being actively exploited in the wild.