PSIRT Clarification: Cisco IOS and IOS XE Software Secure Shell Denial of Service Vulnerability
A vulnerability in the Secure Shell (SSH) server code of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload.
The vulnerability is due to an internal state not being represented correctly in the SSH state machine, which leads to an unexpected behavior. An attacker could exploit this vulnerability by creating an SSH connection to an affected device and using a specific traffic pattern that causes an error condition within that connection. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
I'm confused by the wording here, how could the remote hacker become authenticated, and if they're already authenticated, then isn't the damage already done?
Re: PSIRT Clarification: Cisco IOS and IOS XE Software Secure Shell Denial of Service Vulnerability
Well, is the damage already done? yes and no. This depends on the privilege level that the attacker has gained. If the attacker has only read privileges then the attacker could still exploit this vulnerability and cause a reload of the device.
If the attacker has write privileges then there is no need for the attacker to use this exploit as she or he can already do much more damage.
-- Please remember to select a correct answer and rate helpful posts
Hello! I run 126.96.36.199.When I click download updates in ASDM I get:Download updates failed: Peer certificate cannot be authenticated with known CA certificates I have 3 identical devices and all of them have the same problem.. How can I fix ...
You would like to use the ASA Firewall Umbrella Connector to enforce DNS policy with Umbrella. However you would also like to exclude certain IP addresses or subnets from using this policy. I recently had the need to do this, had a bit of tro...
Hi Everyonem Just wondering if anyone knows why I am getting an error that says "Cryptographic algorithms required by the secure gateway do not match those supported by AnyConnect. Please contact your network administrator.". See attached...
The Cisco 2020 CISO Benchmark Report provides valuable takeaways and data on the most pressing topics: the impact of vendor consolidation, cybersecurity fatigue, outsourcing, top causes of downtime, the most impactful threats, and more. The repo...
Hi, Has anyone run into the "Channel down" issue when updating the identity certificate on the Stealthwatch SMCv and SFCv. I'm doing a POC for a client and every time I go an update the identity cert the SMC says "it could save the configuration" and...