Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Positive Technologies Helps Cisco Fix Vulnerabilities in Its IT Infrastructure Deployment Solution

  • Attackers could disrupt the operation of enterprise IT systems by deleting backups.

Positive Technologies researchers Nikita Abramov and Mikhail Klyuchnikov have discovered three vulnerabilities in Cisco HyperFlex HX, a hyperconverged platform for building IT infrastructure from scratch that in 2019 was named the leader in the Gartner Magic Quadrant for Hyperconverged Infrastructure. Cisco has thanked the researchers in the two security advisories it published.

Nikita Abramov said: “These vulnerabilities can negatively affect the internal infrastructure of an enterprise, leading to disruption of its operation. Hyperconverged systems are basically out-of-the-box data centers, combining storage systems, servers, network functions, and software into one module. By exploiting the flaws, attackers can access an organization’s entire infrastructure management system and affect its performance, delete important files, disrupt business processes, and erase backup systems with critical data—scenarios are limited only by the attacker’s imagination.”

Recommended AI News: BrainBox AI Unveils Real Estate Energy Savings Calculator

Related Posts
1 of 27,628

In order to successfully exploit the vulnerabilities, an attacker only needs to gain access to the web interface of the device and send a specific request. Special rights, permissions, or authentication are not required. It’s difficult to estimate the number of vulnerable devices, since this type of equipment is most often located on an organization’s internal network. From a technical point of view, these are logic bugs; they often occur due to inattentiveness of the developer and insufficient testing of the code at the development stage.

Cisco has patched all three: CVE-2021-1497, CVE-2021-1498, and CVE-2021-1499. The first two vulnerabilities are more dangerous, since their exploitation would allow attackers to execute arbitrary commands in the device’s operating system with maximum privileges (root user) and web server rights (Tomcat 8), respectively. The third vulnerability would allow criminals to upload arbitrary files without authorization with limited write access, and is not as dangerous in comparison to the others.

Recommended AI News: Accenture Announces Intent to Acquire Strategy and Business Management Consultancy Exton Consulting

To eliminate the vulnerabilities, organizations should follow the recommendations specified in Cisco’s official notices (1, 2). Deep Network Traffic Analysis (NTA/NDR) systems, in particular PT Network Attack Discovery, will allow enterprises to detect attempts to exploit vulnerabilities in Cisco’s firewall. In the case of a successful attack, one of the ways to detect signs of penetration is to use SIEM solutions (for example, MaxPatrol SIEM), which help identify suspicious behavior on the server, register an incident, and prevent the intruders from moving laterally within the corporate network in a timely manner.

Recommended AI News: Sumo Logic and AWS Collaborate to Transform Security for Multi-Cloud and Hybrid Threat Protection

Comments are closed.