What's new

Now, it's Cisco's turn (at least for its older hardware).

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

L&LD

Part of the Furniture

The only thing we know for sure is that we don't know anything for sure.

I mean if your corporate network is in a position for someone to gain admin access to your router remotely, and not detect the reboot when the IOS is changed, you've got bigger issues.

It's funny that one of their recommendations is to disable outbound telnet/ssh connections (pretty standard practice) - if they have admin access, they can turn that right back on.....
 
I know one of the threat actors. The article is talking about Field Upgradeable ROMMON Integrity test. @Viktor Jaep is involved here...
 
It's funny that one of their recommendations is to disable outbound telnet/ssh connections (pretty standard practice)

Another...

"In particular, highly prioritize replacing all end-of-life and unsupported equipment as soon as possible."

OE
 
Just in case - don’t touch my RV320. Thank you. WAN IP 192.168.132.100.
Dude you are totally getting hacked now after providing your private WAN IP! lol
 
This is very vague with the only issue being they are gaining admin privileges and going from there using old hardware and code that is not upgraded. Hardware needs to be replaced when it has reached EOL.
  • There is no indication that any Cisco vulnerabilities were exploited. Attackers used compromised credentials to perform administrative-level configuration and software changes.
  • Modern Cisco devices include secure boot capabilities, which do not allow the loading and executing of modified software images. For more information on secure boot, see the Cisco Trustworthy Technologies Data Sheet.
  • The stolen code-signing certificates mentioned in the report are not from Cisco. Cisco does not have any knowledge of code-signing certificates being stolen to perform any attack against Cisco infrastructure devices.
 

Similar threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top