Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Chinese Hackers Use Cisco Zero-Day Switches to Deliver Malware
Global Security

Chinese Hackers Use Cisco Zero-Day Switches to Deliver Malware

AdminBy AdminJuly 6, 2024No Comments3 Mins Read
Cisco Switches Zero-Day
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 2, 2024Information hallCyber ​​Espionage / Vulnerability

Cisco Zero-Day Switches

Cyber ​​espionage group linked to China named Velvet ant a zero-day flaw in the Cisco NX-OS software used in switches has been observed to be used to deliver malware.

The vulnerabilitywhich is tracked as CVE-2024-20399 (CVSS Score: 6.0), concerns the injection of a command that allows an authenticated local attacker to execute arbitrary commands as root on the underlying operating system of the affected device.

“By exploiting this vulnerability, Velvet Ant successfully launched a previously unknown custom malware that allowed the threat group to remotely connect to compromised Cisco Nexus devices, download additional files, and execute code on the devices,” according to cybersecurity firm Sygnia. said in a statement shared with The Hacker News.

Cisco stated that the issue occurs due to insufficient validation of arguments passed to certain configuration CLI commands, which could be exploited by an adversary by including crafted input as an argument to a CLI command that affects the configuration.

Cyber ​​security

Moreover, it allows a user with administrative privileges to execute commands without triggering syslog messages, making it possible to hide the execution of shell commands on compromised devices.

Despite​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​into of the code execution of the flaw an attacker must have administrative credentials and have access to certain configuration commands in order to exploit it. CVE-2024-20399 affects the following devices −

  • MDS 9000 Series Multilevel Switches
  • Nexus 3000 Series Switches
  • Nexus 5500 Platform Switches
  • Nexus 5600 platform switches
  • Nexus 6000 Series Switches
  • Nexus 7000 series switches and
  • Nexus 9000 series switches in NX-OS offline mode

Sygnia said it discovered the use of CVE-2024-20399 in the wild during a broader forensic investigation that took place last year. Cisco, however, noted that it became aware of an attempted exploit in April 2024.

Velvet Ant was first documented by an Israeli cybersecurity firm last month in connection with a cyberattack targeting an unnamed organization located in East Asia over a period of approximately three years by establishing persistence using legacy F5 BIG-IP devices to stealthily steal customers and financial information.

Cyber ​​security

“Network devices, particularly switches, are often unmonitored and their logs are often not routed to a centralized logging system,” Signia said. “This lack of monitoring creates serious challenges in detecting and investigating malicious activity.”

Development occurs when threat actors use a critical vulnerability affecting D-Link DIR-859 Wi-Fi routers (CVE-2024-0769CVSS score: 9.8) – path traversal problem leading to disclosure – to collect account information such as names, passwords, groups and descriptions for all users.

“Variants of the exploit (…) allow for the extraction of account data from the device,” said threat intelligence firm GreyNoise. said. “The product has expired, so it will not be fixed, creating a long-term operational risk. Multiple XML files can be invoked using this vulnerability.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025

Iran related

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.