Cisco patches IOS XE zero-days used to hack over 50,000 devices

Trending 1 month ago

Cisco patches zero-days exploited to hack complete 50,000 IOS XE systems

Cisco has addressed nan 2 vulnerabilities (CVE-2023-20198 and CVE-2023-20273) that hackers exploited to discuss tens of thousands of IOS XE devices complete nan past week.

The free package merchandise comes aft a threat character leveraged nan information issues arsenic zero-days to discuss and return afloat power of much than 50,000 Cisco IOS XE hosts.

Critical and medium-severity flaws

In an update to nan original advisory, Cisco says that nan first fixed package merchandise is disposable from nan company’s Software Download Center.

At nan moment, nan first fixed merchandise disposable is 17.9.4a, pinch updates to rotation retired astatine a yet undisclosed date.

Cisco IOS XE Software Release Train First Fixed Release Available
17.9 17.9.4a Yes
17.6 17.6.6a TBD
17.3 17.3.8a TBD
16.12 (Catalyst 3650 and 3850 only) 16.12.10a TBD

Both vulnerabilities, which Cisco tracks arsenic CSCwh87343, are successful nan web UI of Cisco devices moving nan IOS XE software. CVE-2023-20198 has nan maximum severity standing (10/10) while CVE-2023-20273 has been assigned a precocious severity people of 7.2.

The vendor of networking cogwheel says that nan threat character exploited nan captious flaw to summation first entree to nan instrumentality and past “issued a privilege 15 command” to create a normal section account.

On Cisco devices, permissions to rumor commands are locked into levels from zero to 15, pinch zero providing 5 basal commands (“logout,” “enable,” “disable,” “help,” and “exit”) and 15 being nan astir privileged level that provides complete power complete nan device.

By leveraging CVE-2023-20273, nan attacker elevated to guidelines nan privileges of nan caller section personification and added a malicious book to nan record system. The implant does not supply persistence and a reboot will region it from nan system.

The institution warns that nan 2 vulnerabilities tin beryllium exploited if nan web UI (HTTP Server) characteristic of nan instrumentality is turned on, which is imaginable done nan ip http server aliases ip http secure-server commands.

Administrators tin cheque if nan characteristic is progressive by moving nan show running-config | see ip http server|secure|active command to cheque successful nan world configuration for nan ip http server or nan ip http secure-server Commands.

“The beingness of either bid aliases some commands successful nan strategy configuration indicates that nan web UI characteristic is enabled” - Cisco

Sudden driblet successful Hacked Cisco IOS XE hosts

When Cisco disclosed CVE-2023-20198 connected October 16 arsenic a zero-day exploited successful nan wild, information researchers started looking for compromised devices.

Initial findings estimated that astir 10,000 Cisco IOS XE susceptible devices had been infected by Tuesday. The number grew quickly to more than 40,000 successful conscionable a fewer days arsenic much researchers joined nan search.

On October 20, Cisco disclosed nan 2nd zero-day being exploited successful nan aforesaid run to return complete power of systems moving nan IOS XE software.

Over nan weekend, though, researchers saw a steep driblet successful nan number of Cisco IOS XE hosts hacked utilizing nan 2 zero-day vulnerabilities, from about 60,000 to conscionable a fewer hundred.

It is unclear what caused nan mysterious abrupt driblet but 1 mentation is that nan attacker has deployed an update to hide their beingness and nan malicious implants are nary longer visible successful scans.

Piotr Kijewski, the CEO of The Shadowserver Foundation told BleepingComputer that they observed a crisp driblet successful implants since October 21 to conscionable 107 devices.

The logic for nan abrupt debased number could besides beryllium that a grey-hat hacker has been automatically rebooting infected devices to region nan malicious implant.

However, we can’t cognize for judge until Cisco completes its investigation and provides a nationalist study aliases different information researchers travel to a conclusion analyzing a breached Cisco IOS XE system.

After publishing this article, researchers astatine Fox-IT cybersecurity institution published caller accusation that explains why nan number of compromised Cisco IOS XE devices plumetted lately.

Fox-IT says that nan malicious codification connected tens of thousands of devices "has been altered to cheque for an Authorization HTTP header worth earlier responding" and that utilizing a different method shows that 37,890 are still compromised.

The researchers counsel admins pinch IOS XE systems that person nan web UI exposed connected nan net to do a forensic triage and supply a repository pinch nan basal steps to check if nan implant was progressive connected nan host.

They repository besides provides an replacement method to scan devices for nan beingness of nan malicious codification planted during nan Cisco IOS XE hack campaign.

Update [12:16 PM, EDT]: Added accusation from Fox-IT researchers saying that hacked Cisco IOS XE devices are nary longer visible because nan malicious implant connected them has been modified to cheque for an Authorization petition header worth earlier replying.