Article Details
Scrape Timestamp (UTC): 2025-03-03 17:54:41.279
Original Article Text
Click to Toggle View
CISA tags Windows, Cisco vulnerabilities as actively exploited. CISA has warned US federal agencies to secure their systems against attacks exploiting vulnerabilities in Cisco and Windows systems. While the cybersecurity agency has tagged these flaws as actively exploited in the wild, it has yet to provide specific details regarding this malicious activity and who is behind it. The first flaw (tracked as CVE-2023-20118) enables attackers to execute arbitrary commands on RV016, RV042, RV042G, RV082, RV320, and RV325 VPN routers. While it requires valid administrative credentials, this can still be achieved by chaining the CVE-2023-20025 authentication bypass, which provides root privileges. Cisco says in an advisory published in January 2023 and updated one year later that its Product Security Incident Response Team (PSIRT) is aware of CVE-2023-20025 publicly available proof-of-concept exploit code. The second security bug (CVE-2018-8639) is a Win32k elevation of privilege flaw that local attackers logged into the target system can exploit to run arbitrary code in kernel mode. Successful exploitation also allows them to alter data or create rogue accounts with full user rights to take over vulnerable Windows devices. According to a security advisory issued by Microsoft in December 2018, this vulnerability impacts client (Windows 7 or later) and server (Windows Server 2008 and up) platforms. Today, CISA added the two vulnerabilities to its Known Exploited Vulnerabilities catalog, which lists security bugs the agency has tagged as exploited in attacks. As mandated by the Binding Operational Directive (BOD) 22-01 issued in November 2021, Federal Civilian Executive Branch (FCEB) agencies now have three weeks, until March 23, to secure their networks against ongoing exploitation. "These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise," CISA said today. Microsoft and Cisco have not yet updated their security advisories after CISA tagged the two vulnerabilities as actively exploited in attacks. In early February, CISA also announced that a critical Microsoft Outlook remote code execution (RCE) vulnerability (CVE-2024-21413) is now being exploited in ongoing attacks and ordered federal agencies to patch their systems by February 27.
Daily Brief Summary
CISA has issued warnings about vulnerabilities in Cisco and Windows systems currently being exploited.
Active exploitation includes CVE-2023-20118 in Cisco VPN routers, allowing execution of arbitrary commands with proper credentials.
The CVE-2023-20025 flaw in Cisco provides an authentication bypass, potentially used in tandem with other vulnerabilities.
Windows is affected by CVE-2018-8639, an elevation of privilege vulnerability allowing attackers to run arbitrary code in kernel mode.
CISA has added these vulnerabilities to the Known Exploited Vulnerabilities catalog, requiring federal agencies to respond swiftly.
Agencies within the Federal Civilian Executive Branch must secure their networks by March 23 to comply with CISA directives.
Both Microsoft and Cisco have been previously notified, with a lack of updated advisories post-CISA's announcement of these exploits.