Home Security More than 150,000 switches have exploitable Cisco tool turned on

More than 150,000 switches have exploitable Cisco tool turned on

More than 156,000 Cisco switches on the Internet still have the company's Smart Install Client turned on, despite warnings that the tool could be exploited to scan such switches and change software in order to stage attacks.

Omar Santos, Cisco's cyber security principal engineer at the company's product security incident response team, said in a tweet that the number of hosts had dropped by about 10,000 after a week a warning was issued by Cisco's Talos Intelligence Group on 5 April. (Graphic below, right, shows the countries where the vulnerable switches are located.)

"We are down 10,000 hosts or so in a week," Santos wrote. "But there are still over 156K devices with Smart Install exposed to the Internet according to @shodanhq !! Please disable it or block TCP port 4786! We are still seeing abuse of the protocol." He added that a scan using the Shodan search engine had shown that this number of switches had the utility still active. 

Recent attacks on sites belonging to Russian and Iranian interests have been put down to exploitation of the protocol in the Smart Install Client.

The attackers have been leaving patriotic messages on on the Web interface of the routers they had attacked.

shodan cisco scanA week back, Santos clarified in a tweet that it was the protocol that being exploited, and not another vulnerability in the Smart Install Client, which had been found recently and patched.

"Folks, CVE-2018-0171 is NOT what is being exploited globally," he wrote. "It is the protocol abuse. You MUST disable Smart Install or apply an ACL! The protocol is broken!"

In a blog post on 5 April, Talos wrote that the Cisco Smart Install Client was a legacy utility that could be used for no-touch installation of new Cisco switches.

But, it said, the protocol used by this tool could be abused to modify the settings of the TFTP server, exfiltrate configuration files, and change settings to facilitate the execution of IOS commands.

IOS is a package of routing, switching, inter-networking and telecommunications functions integrated into a multi-tasking operating system.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications