Original Article Text

Click to Toggle View

Australia warns of BadCandy infections on unpatched Cisco devices. The Australian government is warning about ongoing cyberattacks against unpatched Cisco IOS XE devices in the country to infect routers with the BadCandy webshell. The vulnerability exploited in these attacks is CVE-2023-20198, a max-severity flaw that allows remote unauthenticated threat actors to create a local admin user via the web user interface and take over the devices. Cisco fixed the flaw in October 2023, which was then marked as an actively exploited issue. A public exploit became available two weeks later, fueling mass exploitation for backdoor planting on internet-exposed devices. The Australian authorities have warned that variants of the same Lua-based BadCandy web shells are still used in attacks throughout 2024 and 2025, indicating that many Cisco devices remain unpatched. Once installed, BadCandy allows remote attackers to execute commands with root privileges on compromised devices. The webshell is wiped from the devices upon reboot. However, given the lack of a patch on those devices and assuming the web interface remains accessible, the attackers can easily re-introduce it. "Since July 2025, ASD assesses over 400 devices were potentially compromised with BADCANDY in Australia," reads the bulletin. "As at late October 2025, there are still over 150 devices compromised with BADCANDY in Australia." Although the number of infections is declining, the agency has seen signs of re-exploitation of the flaw against the same endpoints, even though the breach entities were appropriately alerted. According to the agency, the attackers can detect when the BadCandy implant gets removed and target the same device to re-introduce it. In response to the ongoing attacks, the Australian Signals Directorate is sending notifications to victims that include instructions on patching, hardening devices, and conducting incident response. For devices whose owners cannot be determined, the ASD is asking internet service providers to contact victims on their behalf. The ASD mentions that the flaw has been previously leveraged by state actors such as the Chinese' Salt Typhoon,' who are considered responsible for a series of attacks against large telecommunication service providers across the U.S. and Canada. The agency believes that, even though BadCandy can theoretically be used by anyone, the recent spikes can be attributed to "state-sponsored cyber-actors." Administrators of Cisco IOS XE systems worldwide, including in Australia, should follow the vendor's mitigation recommendations in the security bulletin. Cisco has also published a detailed hardening guide for IOS XE devices. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.

Daily Brief Summary

VULNERABILITIES // Australian Government Alerts on BadCandy Exploits in Cisco Devices

The Australian government has issued warnings about active cyberattacks targeting unpatched Cisco IOS XE devices, exploiting CVE-2023-20198 to install the BadCandy webshell.

This critical vulnerability allows remote attackers to create admin users via the web interface, leading to potential device takeovers.

Although Cisco patched the flaw in October 2023, a public exploit emerged shortly after, resulting in widespread exploitation of exposed devices.

BadCandy enables attackers to execute commands with root privileges; the webshell is removed upon reboot but can be easily reinstalled if the device remains unpatched.

As of October 2025, over 150 devices in Australia remain compromised, with signs of re-exploitation despite previous alerts to affected entities.

The Australian Signals Directorate is actively notifying victims and collaborating with ISPs to ensure patching and device hardening.

The vulnerability has been previously exploited by state actors, including China's Salt Typhoon, targeting telecom providers in North America.

Administrators are urged to follow Cisco's mitigation strategies and hardening guidelines to protect against ongoing threats.