
"The bug, which has a maximum-rated vulnerability severity score of 10.0, allows hackers to remotely break into networks running its Catalyst SD-WAN products, which allow large companies and government agencies with multiple offices to connect their private networks over long distances."
"By exploiting this bug over the internet, hackers can gain the highest-level of permissions to these devices and maintain persistent hidden access inside a victim's network, allowing them to spy or steal data over a long period of time."
"U.S. cybersecurity agency CISA ordered all civilian federal agencies to patch their systems by end-of-day Friday, citing an imminent threat and unacceptable risk to the federal government. The federal cybersecurity agency, which is currently running at reduced capacity due to a partial government shutdown, said it was aware of ongoing exploitation."
Cisco identified a maximum-severity vulnerability (10.0 rating) in its Catalyst SD-WAN products that has been exploited for at least three years, dating back to 2023. The bug enables hackers to remotely gain highest-level permissions on affected devices and maintain persistent hidden access within victim networks for espionage and data theft. Critical infrastructure organizations are among those affected. Multiple governments including the U.S., UK, Canada, Australia, and New Zealand issued alerts warning of global targeting. CISA mandated all civilian federal agencies patch systems immediately, citing imminent threat and ongoing exploitation. The attacks are tracked as UAT-8616, though no specific threat actor attribution was disclosed. This follows a similar critical vulnerability in Cisco Async software discovered in December.
#cisco-vulnerability #sd-wan-security #critical-infrastructure #cybersecurity-threat #government-response
Read at TechCrunch
Unable to calculate read time
Collection
[
|
...
]