Attackers are trying to exploit a high-severity zeroday in Cisco gear
Exploits can exhaust memory in hardware used by telecoms and cloud providers. …
reader comments
34 with 24 posters participating, including story author
Telecoms and data-center operators take note: attackers are actively trying to exploit a high-severity zeroday vulnerability in Cisco networking devices, the company warned over the weekend.
The security flaw resides in Cisco’s iOS XR Software, an operating system for carrier-grade routers and other networking devices used by telecommunications and data-center providers. In an advisory published on Saturday, the networking-gear manufacturer said that a patch is not yet available and provided no timeline for when one would be released.
Memory exhaustion
CVE-2020-3566, as the vulnerability is tracked, allows attackers to “cause memory exhaustion, resulting in instability of other processes” including but not limited to interior and exterior routing protocols. Exploits work by sending maliciously crafted Internet Group Management Protocol traffic. Normally, IGMP communications are used by one-to-many networking applications to conserve resources when streaming video and related content. A flaw in the way iOS XR Software queues IGMP packets makes it possible to consume memory resources.
“An attacker could exploit this vulnerability by sending crafted IGMP traffic to an affected device,” Saturday’s advisory stated. “A successful exploit could allow the attacker to cause memory exhaustion, resulting in instability of other processes. These processes may include, but are not limited to, interior and exterior routing protocols.”
Independent researcher Troy Mursch, who monitors active Internet attacks using honeypots—or simulated production networks belonging to organizations and consumers—told me he had seen limited signs of exploitation attempts.
“There was some IGMP scanning activity last week, but we haven’t seen a widespread type of attack,” he said.
He said the
Continue reading – Article source