Authentication Bypass Vulnerability in REST API Affects Cisco Devices

Forums Security News (Security) Authentication Bypass Vulnerability in REST API Affects Cisco Devices

Tagged: 

  • This topic has 1 voice and 0 replies.
Viewing 0 reply threads
  • Author
    Posts
    • #37734
      Telegram SmartBoT
      Moderator
      • Topic 5959
      • Replies 0
      • posts 5959
        @tgsmartbot

        #News(Security) [ via IoTGroup ]


        Headings…
        Authentication Bypass Vulnerability in Cisco REST API Let Hackers Take Cont
        How to Find the Vulnerable Devices
        Share and Support Us :
        Critical Wi-Fi Bug In Linux Let Hackers Take Complete Control and Crash The
        Adobe Fixes 82 Vulnerabilities in Adobe Acrobat and Reader, Experience & Do
        A Vulnerability In Linux Sudo Let the Restricted Linux Users to Run Command
        Winnti Hacker Group Uses New Malware to Hack Microsoft SQL Servers
        Network Intruders Teamup With Ransomware Developers to Hack Corporate Netwo
        Hackers Embedded the Malicious Code Within WAV Audio Files to Gain…
        ATM Jackpotting – Cutlet Maker Malware Spike Around the World to…

        Auto extracted Text……

        Cisco released a security update for critical Authentication Bypass vulnerability that resides in the Cisco REST API virtual service container for Cisco IOS XE Software allows a remote attacker to bypass the authentication in managed Cisco devices.
        An Authentication Bypass vulnerability affected the Cisco IOS XE due to an improper check performed by the area of code that manages the REST API authentication service.
        Cisco REST API is an application that running in the virtual service container, a virtualized environment on a device.
        If the attacker has successfully obtained the authentication token key, it allows him to bypass the device authentication and execute the system privilege via an interface of the REST API virtual service container.
        The Authentication bypass vulnerability affected the following series:
        Cisco 4000 Series Integrated Services Routers
        Cisco ASR 1000 Series Aggregation Services Routers
        Cisco Cloud Services Router 1000V Series
        Cisco Integrated Services Virtual Router
        According to Cisco, In order to exploit the vulnerability, the attack needs to meet with the following conditions:
        The device runs an affected Cisco IOS XE Software release.
        The device has installed and enabled an affected version of the Cisco REST API virtual service container.
        How to Find the Vulnerable Devices
        In order to find whether the Cisco REST API service container is enabled, the admin can use the following command and refer the output.
        router#show virtual-service detail | include Restful
        If you will not find the string Enabled, UP then your device is not affected by this vulnerability.
        If the device Is using an Affected Cisco REST API Virtual Service Container Release, you can use the following privileged EXEC command


        Read More..
        AutoTextExtraction by Working BoT using SmartNews 1.0299999999 Build 26 Aug 2019

    Viewing 0 reply threads
    • You must be logged in to reply to this topic.