Recently, a security incident affecting Cisco's back-end infrastructure was discovered. Attackers exploited two vulnerabilities in Cisco equipment, potentially impacting customers using their products. Here are the key details:
Incident Details
-
Exploited Vulnerabilities:
- CVE-2020-11651 (Authentication Bypass): This vulnerability allowed attackers to access Cisco's back-end servers without proper authentication.
- CVE-2020-11652 (Directory Traversal): The second vulnerability enabled attackers to escalate privileges and access sensitive directories on the affected servers.
-
Affected Products:
- Cisco VIRL-PE (Internet Routing Lab Personal Edition): This service is used for modeling and creating virtual network architectures.
- Cisco Modeling Labs Corporate Edition (CML): Another popular Cisco product that also includes the SaltStack package.
- Impact on Customers: Companies using both VIRL-PE and CML in the same environment should apply patches to protect against these vulnerabilities.
Cisco's Actions
- Security Patches: Cisco has already patched the vulnerabilities. Users are advised to apply these security patches promptly.
- Risk Assessment: Cisco is assessing the potential impact on its customers and taking measures to mitigate any additional risks.
This incident underscores the importance of keeping systems up to date and applying security patches regularly. If you're a Cisco customer, be sure to follow the security recommendations provided by the company.