Cisco flaw enables 'simulated' DDoS attack

By

Patch Cisco routers immediately, expert warns.

Cisco has released a patch for IOS, the company's network operating system, to fix a flaw that could have allowed a remote attacker to shut down Cisco routers, simulating a distributed denial of service (DDoS) attack.

Cisco flaw enables 'simulated' DDoS attack

Ty Miller, chief technical officer at Pure Hacking, said the most recent IOS flaw was in Cisco's Border Gateway Protocol (BGP), which tells the router where to redirect traffic. By exploiting the flaw remotely, he said, criminals could recreate the effect of a DDoS attack, without requiring an army of zombie computers for assistance.

"It is a DDoS attack that caused the BGP service to forget where it is supposed to redirect traffic. You should be able to exploit it instead of using a botnet army -- you should be able to use just a few packets instead of flooding the network," Miller said.

DDoS attacks flood a company's network with a multitude of requests, which effectively slows the network to a crawl. Or in some instances forces the network to completely fall over, such was the case for Twitter and Facebook recently.

Miller said the prevalence of Cisco routers means a large number of companies will be affected and he advises companies to patch routers as soon as possible.

However, he said, by exploiting this flaw, although criminals would be able to effectively shut affected routers, they would not be able to steal corporate information.

"If I was vulnerable, I would be patching it straight away to protect myself. At this stage it is only a denial of service attack, which means they are not going to get any access to your systems or compromise your network.

"It is likely the flaw will be around for some time as companies generally do not like to update their router's OS," he said. 

Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Greater Western Water's billing system data issues laid bare

Greater Western Water's billing system data issues laid bare

Attackers weaponise Linux file names as malware vectors

Attackers weaponise Linux file names as malware vectors

Microsoft plans full quantum-resistant cryptography transition by 2033

Microsoft plans full quantum-resistant cryptography transition by 2033

Log In

  |  Forgot your password?