Critical bug in Cisco UWRB access points allows attackers to run commands as root
Cisco fixed a critical flaw in URWB access points, allowing attackers to run root commands, compromising industrial wireless automation security.
Cisco has addressed a critical vulnerability, tracked as CVE-2024-20418, that could be exploited by unauthenticated, remote attackers to run commands with root privileges on vulnerable Ultra-Reliable Wireless Backhaul (URWB) access points used for industrial wireless automation.
The vulnerability resides in the web-based management interface of Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points.
The vulnerability allows attackers to execute arbitrary commands with root privileges by sending crafted HTTP requests to the device.
“A vulnerability in the web-based management interface of Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points could allow an unauthenticated, remote attacker to perform command injection attacks with root privileges on the underlying operating system.” reads the advisory published by the company.
“This vulnerability is due to improper validation of input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system of the affected device.”
The vulnerability only affects specific models in URWB mode: Catalyst IW9165D, IW9165E, and IW9167E access points. To check if the device is affected, use the “show mpls-config” CLI command. If available, URWB mode is enabled and the device is vulnerable.
The Cisco PSIRT is not aware of attacks in the wild exploiting this vulnerability.
The IT giant pointed out that there are no workarounds that address this vulnerability.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – Cisco, URWB access points)
目录
最新
- Tor Project needs 200 WebTunnel bridges more to bypass Russia’ censorship
- Interpol: Operation HAECHI-V led to more than 5,500 suspects arrested
- How threat actors can use generative artificial intelligence?
- SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 22
- Security Affairs newsletter Round 500 by Pierluigi Paganini – INTERNATIONAL EDITION
- Hackers stole millions of dollars from Uganda Central Bank
- 15 SpyLoan Android apps found on Google Play had over 8 million installs
- Notorious ransomware programmer Mikhail Pavlovich Matveev arrested in Russia