Article Details

Scrape Timestamp (UTC): 2024-11-07 11:53:00.101

Source: https://www.theregister.com/2024/11/07/cisco_uiws_flaw/

Original Article Text

Click to Toggle View

Cisco scores a perfect CVSS 10 with critical flaw in its wireless system. Ultra-Reliable Wireless Backhaul doesn't live up to its name. Cisco is issuing a critical alert notice about a flaw that makes its so-called Ultra-Reliable Wireless Backhaul systems easy to subvert. The weakness – dubbed CVE-2024-20418 and made public yesterday – is with the Unified Industrial Wireless Software that the devices use. Crucially, the flaw is serious enough that a remote attacker with no privileges could upgrade themselves to admin-level access and install whatever nasties they like. "An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system," Cisco warned. "A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system of the affected device." The following kit is affected and needs immediate patching if URWB is enabled – there are no workarounds: You can check if it is enabled on your own kit by using the show mpls-config CLI command. The flaw carries a CVSS score of 10.0 because it's both simple and devastatingly effective. It's also dangerous because this kind of kit is designed for industrial uses and it is just the kind of code you'd expect to find in critical infrastructure targets – such as ports or factories. You can get your fix here and are advised to apply it immediately. There are not yet any reported sightings of the vulnerability being exploited in the wild.

Daily Brief Summary

MALWARE // Cisco Warns of Critical Vulnerability in Wireless Backhaul Systems

Cisco has issued a critical alert for a flaw in its Ultra-Reliable Wireless Backhaul systems, rated CVSS 10.

The flaw, identified as CVE-2024-20418, affects the Unified Industrial Wireless Software, allowing admin-level remote access exploitation.

Attackers can execute arbitrary commands with root privileges by sending crafted HTTP requests to the system's web management interface.

There are no available workarounds for this vulnerability; immediate patching is necessary.

The vulnerability poses significant risks especially in industrial settings like ports or factories due to the potential disruption of critical infrastructure.

Users can verify the activation of the vulnerable setting using the 'show mpls-config' CLI command.

Cisco urges customers to apply the security fix promptly to prevent potential exploits.

No instances of exploitation in the wild have been reported as of yet.