Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Cisco Fixes Actively Exploited Bugs In Carrier-Grade Routers

Cisco Fixes Actively Exploited Bugs In Carrier-Grade Routers

Cisco fixed two actively exploited and high severity memory exhaustion DoS vulnerabilities found in the IOS XR software that runs on multiple carrier-grade routers.

The Cisco IOS XR Network OS is deployed on several router platforms including the NCS 540 & 560, NCS 5500, 8000, and ASR 9000 series routers.

Cisco warned customers on August 29th of ongoing attacks targeting carrier-grade routers running vulnerable Cisco IOS XR software versions.

“On August 28, 2020, the Cisco Product Security Incident Response Team (PSIRT) became aware of attempted exploitation of these vulnerabilities in the wild,” Cisco explained.

The two denial-of-service (DoS) security flaws — tracked as CVE-2020-3566 and CVE-2020-3569 â€” exist in the Distance Vector Multicast Routing Protocol (DVMRP) feature of the IOS XR software.

They impact any Cisco device running any Cisco IOS XR Software release if one of the active interfaces is configured under multicast routing.

Remote and unauthenticated attackers who successfully exploit them by sending crafted IGMP traffic can exhaust the targeted routers’ memory.

Also Read: The PDPA Data Breach August 2020: A Recap of 8 Alarming Cases

Security fixes available

While at the time it disclosed the attacks Cisco only provided customers with mitigation measures to block exploitation attempts, the company has now released free Software Maintenance Upgrades (SMUs) to address the two vulnerabilities.

The table embedded below contains information on what fixes should be deployed for each of the two security flaws on affected routers.

Cisco IOS XR ReleaseFix Needed for CSCvv54838Fix Needed for CSCvr86414Notes
Earlier than 6.6.3YesYesFixes are provided through bug CSCvv60110, which was created to combine the fixes for both CSCvv54838 and CSCvr86414.

SMU names include CSCvv60110.
6.6.3 and laterYesNoFix needed for only CSCvv54838. Releases 6.6.3 and later already contain the fix for CSCvr86414.

SMU names include CSCvv54838.

To find if multicast routing is enabled on a device exposing it to potential attacks, admins can run the show igmp interface command.

For IOS XR routers were the multicast routing feature is not enabled, the output of the command will be empty and the devices are not affected by the two flaws.

Mitigation measures

For vulnerable devices where admins cannot immediately apply the security fixes, Cisco recommends implementing “an access control entry (ACE) to an existing interface access control list (ACL)” or a new ACL to deny inbound DVRMP traffic to interfaces with multicast routing enabled.

Admins are also advised to disable IGMP routing on interfaces where processing IGMP traffic is not necessary.

This can be done by entering IGMP router configuration mode by issuing the router igmp command, selecting the interface using interface, and then disabling IGMP routing using router disable.

In July, Cisco fixed another actively exploited read-only path traversal vulnerability, as well as pre-auth critical remote code execution (RCE), authentication bypass, and static default credential vulnerabilities that could lead to full device takeover.

Also Read: Going Beyond DPO Meaning: Ever Heard of Outsourced DPO?

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us