Cisco Umbrella users urged to close bug

By

Static SSH key lets miscreants steal admin credentials.

If a Cisco Umbrella Virtual Appliance (VA) customer has enabled SSH, they need to patch it against a credential-stealing vulnerability.

Cisco Umbrella users urged to close bug

The company disclosed the bug in this notice, saying it could allow an attacker to impersonate a VA.

Cisco says Umbrella is used by 24,000 organisations, providing DNS-level security against “malicious and unwanted domains, IP addresses, and cloud applications” before a user connects to them.

An unpatched system has a static SSH host key. The vendor explained that if an attacker performed a man-in-the-middle attack on an SSH connection to the Umbrella VA, they could “learn the administrator credentials, change configurations, or reload the VA”.

The vulnerability has been assigned CVE-2022-20773, and because it’s only present in non-default configurations, it has a Common Vulnerability Scoring System rating of high, at 7.5.

It affects VAs for VMWare ESXi and Hyper-V in versions earlier than 3.3.2, and customers are also advised to check whether SSH is running.

Cisco says it’s not aware of any exploits of the vulnerability, and attributed discovery of the bug to Fraser Hess of Pinnacol Assurance.

 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Qantas obtains court order to prevent third-party access to stolen data

Qantas obtains court order to prevent third-party access to stolen data

Cloudflare makes changes to avoid repeat of 1.1.1.1 DNS outage

Cloudflare makes changes to avoid repeat of 1.1.1.1 DNS outage

CBA using facial recognition logins to verify disputed payments

CBA using facial recognition logins to verify disputed payments

ACSC alerts to exploited MS SharePoint remote code execution flaw

ACSC alerts to exploited MS SharePoint remote code execution flaw

Log In

  |  Forgot your password?