Alert from CISA Regarding Hackers Exploiting Outdated Cisco Smart Install Feature

Aug 09, 2024Ravie LakshmananVulnerability / Network Security

The Cybersecurity and Infrastructure Security Agency (CISA) in the U.S.

CISA Warns of Hackers Exploiting Legacy Cisco Smart Install Feature

Aug 09, 2024Ravie LakshmananVulnerability / Network Security

CISA Warns of Hackers Exploiting Legacy Cisco Smart Install Feature

The Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. has alerted that cybercriminals are exploiting the outdated Cisco Smart Install (SMI) feature to gain unauthorized access to sensitive information.

According to the agency’s report, malicious actors have been successful in extracting system configuration files through exploiting available protocols or software on devices, particularly by misusing the outdated Cisco Smart Install feature.

CISA has also noticed prevalent use of weak password algorithms on Cisco network hardware, making them susceptible to brute-force attacks aimed at cracking passwords. These algorithms are used to secure device passwords within system configuration files.

Cybersecurity

If attackers manage to exploit this access, they can easily obtain system configuration files, leading to a significant compromise of the affected networks.

“It is crucial for organizations to ensure that all passwords on network devices are encrypted using robust security measures,” emphasized CISA, recommending the use of “type 8 password” encryption for all Cisco devices in order to safeguard passwords stored within configuration files.

Enterprises are urged to refer to the National Security Agency’s (NSA) guide on Smart Install Protocol Misuse and the Network Infrastructure Security Guide for comprehensive configuration recommendations.

Further recommendations include the adoption of robust cryptographic hashing techniques for password storage, avoidance of password duplication, enforcement of strong and intricate passwords, and refraining from utilizing unaccountable group accounts.

This development coincides with Cisco’s notification of the availability of a Proof of Concept (PoC) code for CVE-2024-20419 (CVSS score: 10.0), a critical vulnerability affecting Smart Software Manager On-Prem (Cisco SSM On-Prem) that could enable unauthorized users to alter passwords.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.