As usual, this week has started with the reporting of a security flaw in one of Cisco developments. According to a vulnerability testing report, the Cisco IOS XR software is impacted by a flaw in the Secure Shell (SSH) authentication feature; if exploited, this vulnerability could allow an unauthenticated remote hacker to log in to an affected device using two different usernames.
According to the report, the vulnerability exists due to a logical error, which can be triggered when certain actions are joined during an SSH login on an affected device. Threat actors could abuse this failure by logging an SSH session on the affected device with a specific sequence that presents the two usernames used for the attack.
Vulnerability testing specialists in charge of the report mention that successful exploitation of the flaw could lead to misrepresentation of login data, user enumeration and even command authorization failure in very specific cases.
The flaw, tracked as CVE-2019-1842, received a score of 5.5/10 on the Common Vulnerability Scoring System (CVSS) scale; the risk of exploitation is mentioned as medium, although the danger of a potential successful attack is high.
The Cisco vulnerability testing team mentions that the company corrected the vulnerability with the release of the latest version of Cisco IOS XR software. No workarounds are known for now, so vulnerable deployment administrators are advised to upgrade as soon as possible.
This has been a complex year starting for Cisco, as in less than two months security patches and updates have already been released for at least five critical security flaws in various products used in commercial, industrial and even domestic environments.
For more information on recently encountered security flaws, exploits, cyberattacks, and malware analysis, you can visit the official website of the International Institute of Cyber Security (IICS), as well as websites of technology companies currently working to correct these information security incidents.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.