Attackers can crash Cisco routers via DoS attacks

Due to several security vulnerabilities in Cisco's network operating system IOS XE, various devices are vulnerable. Patches are available for download.

listen Print view

(Image: heise online)

3 min. read

To prevent attackers from exploiting vulnerabilities, network admins with Cisco devices should update the software as quickly as possible. In most cases, devices crash after successful attacks.

As the list of affected devices and security updates is beyond the scope of this post, admins can find this information in the alerts linked below this post. So far there are no reports as to whether there are already attacks.

Videos by heise

Various router models are at risk from the security vulnerabilities in the IOS and IOS XE network operating systems. Due to insufficient checks in the context of Unified Threat Defense (UTD), attackers can use prepared data traffic to exploit a vulnerability (CVE-2024-20455"high").

If such an attack succeeds, it results in a DoS state. In such a case, devices crash and, in the worst case, are no longer available without manual intervention. For such an attack to work, however, UTD must be active. Specifically, 1000 Series Integrated Services Routers (ISRs) and Catalyst 8500L Edge Platforms are at risk.

Attackers can also use a vulnerability (CVE-2024-20437"high") in the web-based management interface of IOS XE to execute their own commands. To do this, however, a victim with authentication must click on a link prepared by the attacker.

Due to a static SSH key in Catalyst Center, attackers can connect to connections as a man-in-the-middle (CVE-2024-20350"high").

List sorted by threat level in descending order:

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.