The newly disclosed critical security vulnerabilities affect Cisco Policy Suite Static SSH Keys and Cisco Cisco Catalyst PON Series Switches Optical Network Terminals. The US Cybersecurity & Infrastructure Security Agency (CISA) has urged users and administrators to review the Cisco advisories and apply the necessary updates.
Cisco Policy Suite – a software package for data management – contains a vulnerability (CVE-2021-40119) in the key of its Secure Shell (SHH) cryptographic network authentication mechanism, which could allow an unauthenticated, remote attacker to login to unpatched systems as the root user.
SEE: A winning strategy for cybersecurity (ZDNet special report)
This ability could provide them with unrestricted permissions to access, read and write files, something that is extremely desirable for attackers looking to access data, install malware or perform other malicious activities.
There are also two critical security vulnerabilities in Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminals that are used to help deliver deliver internet access to multiple endpoints on a single network.
The vulnerabilities (CVE-2021-34795 and CVE-2021-40112) in the web-based management interface of Cisco PON terminals could allow an unauthenticated, remote attacker to login with default credentials if Telnet – a network protocol used to virtually access a computer for collaboration and communications channels – is enabled.
These vulnerabilities also allow attackers to perform command injections and modify configurations, both of which could be exploited for malicious actions.
The specific Cisco products vulnerable to CVE-2021-34795 and CVE-2021-40112 are:
Catalyst PON Switch CGP-ONT-1PCatalyst PON Switch CGP-ONT-4PCatalyst PON Switch CGP-ONT-4PVCatalyst PON Switch CGP-ONT-4PVCCatalyst PON Switch CGP-ONT-4TVCW
By default, Cisco PON Series Switches only allow local LAN connections to the web management interface, so they’re only exploitable if remote web management has been enabled.
Users are urged to visit Cisco Security Advisories as soon as possible in order to download the security patches required to fix the vulnerabilities.
SEE: Ransomware: It’s a ‘golden era’ for cyber criminals - and it could get worse before it gets better
Unpatched vulnerabilities are one of the most common methods cyber criminals, nation state-backed hacking operations and other malicious operations exploit in order to enter networks.
But despite cybersecurity organisations like CISA stressing the importance of patching networks, it’s still common for attackers to be able to exploit years-old vulnerabilities to gain access to networks because, in many cases, the updates aren’t being applied.
MORE ON CYBERSECURITY
CISA passes directive forcing federal civilian agencies to fix 306 vulnerabilitiesRansomware: Now attackers are exploiting Windows PrintNightmare vulnerabilitiesBusinesses don’t talk about being victims of cyberattacks. That needs to changeCybersecurity warning: Russian hackers are targeting these vulnerabilities, so patch nowCloud security in 2021: A business guide to essential tools and best practices