Article Details
Scrape Timestamp (UTC): 2023-10-20 22:16:56.895
Original Article Text
Click to Toggle View
Cisco discloses new IOS XE zero-day exploited to deploy malware implant. Cisco disclosed a new high-severity zero-day (CVE-2023-20273) today, actively exploited to deploy malicious implants on IOS XE devices compromised using the CVE-2023-20198 zero-day unveiled earlier this week. The company said it found a fix for both vulnerabilities and estimates it will be released to customers via the Cisco Software Download Center over the weekend, starting October 22. "Fixes for both CVE-2023-20198 and CVE-2023-20273 are estimated to be available on October 22. The CVE-2021-1435 that had previously been mentioned is no longer assessed to be associated with this activity," Cisco said today. On Monday, Cisco disclosed that unauthenticated attackers have been exploiting the CVE-2023-20198 authentication bypass zero-day since at least September 18 to hack into IOS XE devices and create "cisco_tac_admin" and "cisco_support." As revealed today, the CVE-2023-20273 privilege escalation zero-day is then used to gain root access and take complete control over Cisco IOS XE devices to deploy malicious implants that enable them to execute arbitrary commands at the system. Over 40,000 Cisco devices running the vulnerable IOS XE software have already been compromised by hackers using the two still-unpatched zero-days, according to Censys and LeakIX estimations. Two days earlier, VulnCheck estimates were floating around 10,000 on Tuesday, while the Orange Cyberdefense CERT said one day later that it found malicious implants on 34,500 IOS XE devices. Networking devices running Cisco IOS XE include enterprise switches, access points, wireless controllers, as well as industrial, aggregation, and branch routers. While it's hard to get the exact number of Internet-exposed Cisco IOS XE devices, a Shodan search currently shows that more than 146K vulnerable systems are exposed to attacks. Cisco has cautioned administrators that, even though security updates are unavailable, they can still block incoming attacks by disabling the vulnerable HTTP server feature on all internet-facing systems. "We strongly recommend organizations that may be affected by this activity immediately implement the guidance outlined in Cisco's Product Security Incident Response Team (PSIRT) advisory," the company said. Admins are also strongly advised to look for suspicious or recently created user accounts as potential indicators of malicious activity associated with these ongoing attacks. One way to detect the malicious implant on compromised Cisco IOS XE devices requires running the following command on the device, where the placeholder "DEVICEIP" represents the IP address under investigation: Last month, Cisco warned customers to patch another zero-day bug (CVE-2023-20109) in its IOS and IOS XE software, also targeted by attackers in the wild
Daily Brief Summary
Cisco revealed a new, critical zero-day flaw, CVE-2023-20273, that has been actively utilised to deploy harmful implants on compromised IOS XE devices. This exploit comes close after the declaration of another zero-day, CVE-2023-20198.
Fixes for both viruses are touted to be available to customers via Cisco's Software Download Centre as of October 22nd.
Malicious actors have actively exploited these flaws since at least Sep. 18, accessing IOS XE devices and creating 'cisco_tac_admin' and 'cisco_support'.
CVE-2023-20273 in particular is used by attackers to obtain root access, gain complete control over Cisco IOS XE devices, and deploy malicious implants that enable the execution of arbitrary commands on the system.
Networking devices that run Cisco IOS XE, which includes enterprise switches, access points, wireless controllers, as well as various routers, are vulnerable. An estimated 146K of these systems are openly exposed to such attacks.
While patches are not yet available, administrators can block these attacks by disabling the vulnerable HTTP server feature on all internet-facing systems. Cisco also recommends admins to check for suspicious or new user accounts as potential signs of associated malicious activity.
This follows another warning from Cisco last month to patch another zero-day bug, CVE-2023-20109, in their IOS and IOS XE software that was targeted by attackers.