Cisco Vulnerability Allowed Attackers to Execute Commands as Root

Home/cisco, Internet Security, Security Advisory, Security Update, Tips, vulnerability/Cisco Vulnerability Allowed Attackers to Execute Commands as Root

Cisco Vulnerability Allowed Attackers to Execute Commands as Root

A critical vulnerability in Cisco Unified Industrial Wireless Software, affecting Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points, has been discovered.

CVE-2024-20418

Tracked as CVE-2024-20418, this flaw allows unauthenticated remote attackers to inject commands and execute arbitrary commands as the root user on affected devices.

The vulnerability is due to improper input validation in the web-based management interface. Exploiting it is straightforward; attackers can gain root access by sending specially crafted HTTP requests to the web interface.

Due to its high severity, this flaw has been assigned the maximum CVSS score of 10.0, highlighting its critical nature. It affects several products:

  • Cisco Catalyst IW9165D Heavy-Duty Access Points
  • Cisco Catalyst IW9165E Rugged Access Points and Wireless Clients
  • Cisco Catalyst IW9167E Heavy-Duty Access Points

These devices are vulnerable if running an affected software version with URWB operating mode enabled.

Cisco has released patches to fix the issue, and users should update immediately as no workarounds are available.

Cisco users can check vulnerability by running the “show mpls-config” CLI command. If this command is available, the device is likely affected; if unavailable, URWB mode is disabled, and the device is safe.

Due to the risk of full system compromise, organizations with affected products should prioritize patching.

By | 2024-11-13T07:34:51+05:30 November 8th, 2024|cisco, Internet Security, Security Advisory, Security Update, Tips, vulnerability|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!