CIO Influence
CIO Influence News Networking Security

Positive Technologies Helps Cisco Fix Vulnerabilities in its IT Infrastructure Deployment Solution

Positive Technologies Helps Cisco Fix Vulnerabilities in its IT Infrastructure Deployment Solution
Attackers could disrupt the operation of enterprise IT systems by deleting backups.

Positive Technologies researchers Nikita Abramov and Mikhail Klyuchnikov have discovered three vulnerabilities in Cisco HyperFlex HX, a hyperconverged platform for building IT infrastructure from scratch that in 2019 was named the leader in the Gartner Magic Quadrant for Hyperconverged Infrastructure. Cisco has thanked the researchers in the two security advisories it published.

Recommended ITech News: Schneider Electric Unveils New Research and IT Innovation to Meet the Demands of a Digital-First Future

Nikita Abramov said: “These vulnerabilities can negatively affect the internal infrastructure of an enterprise, leading to disruption of its operation. Hyperconverged systems are basically out-of-the-box data centers, combining storage systems, servers, network functions, and software into one module. By exploiting the flaws, attackers can access an organization’s entire infrastructure management system and affect its performance, delete important files, disrupt business processes, and erase backup systems with critical data—scenarios are limited only by the attacker’s imagination.”

In order to successfully exploit the vulnerabilities, an attacker only needs to gain access to the web interface of the device and send a specific request. Special rights, permissions, or authentication are not required. It’s difficult to estimate the number of vulnerable devices, since this type of equipment is most often located on an organization’s internal network. From a technical point of view, these are logic bugs; they often occur due to inattentiveness of the developer and insufficient testing of the code at the development stage.

Recommended ITech News: SentinelOne Bolsters Global Engineering Organization with Veteran Leadership

Cisco has patched all three: CVE-2021-1497 (CVSS v3.1 score 9.8, discovered by Nikita Abramov), CVE-2021-1498 (scored 7.3, discovered by Mikhail Klyuchnikov), and CVE-2021-1499 (rated 5.3, discovered by Abramov and Klyuchnikov). The first two vulnerabilities are more dangerous, since their exploitation would allow attackers to execute arbitrary commands in the device’s operating system with maximum privileges (root user) and web server rights (Tomcat 8), respectively. The third vulnerability would allow criminals to upload arbitrary files without authorization with limited write access, and is not as dangerous in comparison to the others.

To eliminate the vulnerabilities, organizations should follow the recommendations specified in Cisco’s official notices (1, 2). Deep Network Traffic Analysis (NTA/NDR) systems, in particular PT Network Attack Discovery, will allow enterprises to detect attempts to exploit vulnerabilities in Cisco’s firewall. In the case of a successful attack, one of the ways to detect signs of penetration is to use SIEM solutions (for example, MaxPatrol SIEM), which help identify suspicious behavior on the server, register an incident, and prevent the intruders from moving laterally within the corporate network in a timely manner.

Recommended ITech News: Crypto Projects Computecoin and Pekka Take On the Billion-Dollar Web Services Sector

Related posts

RingCentral Announces Innovations to Make Hybrid Work Simple

Enthought Announces Formation of Digital Transformation, Materials Science Advisory Boards

CIO Influence News Desk

Arrow Electronics and Qualcomm Collaborate to Accelerate Edge and AI Adoption

Business Wire