Over 840,000 Cisco Devices Are Exposed To NSA Exploit Cyberweapon
Cisco's Product Security Incident Response Team uncovered that the more than 840,000 Cisco devices are at risk from vulnerabilities revealed by the "Shadow Brokers" group as part of the NSA exploit cyberweapon.
Cisco Devices At Risk From NSA Exploit Cyberweapon
According to Computerworld, the vulnerability revealed by the "Shadow Brokers" group could allow hackers to access sensitive information from Cisco devices' memory. Over 840,000 Cisco networking devices from around the world are exposed to this vulnerability.
The "Shadow Brokers" hacking group believes that this vulnerability is linked to the U.S. National Security Agency. At its turn, Cisco also announced a similar vulnerability last week.
According to Cisco, this security flaw could affect its IOS, IOS XE and IOS XR software that runs on many of its networking devices. The security vulnerability could allow hackers to gain remote access to Cisco networking devices and extract the contents of a device's memory. This could potentially cause leaks of sensitive information.
The security flaw is due to the way the operating system processes IKEv1 (Internet Key Exchange version 1) requests. Virtual Private Networks (VPN) and other features popular in enterprise environments use this key exchange protocol.
The online publication Tom's Hardware reports that the NSA exploit cyberweapon has already been used at least against of some of Cisco's customers. Cisco announced in a recent security advisory that the company was alerted on August 15, 2016, to information posted online by the Shadow Brokers group that claimed to possess disclosures from the Equation Group. Among the posted materials are to be found exploits for firewall products from multiple vendors, including a cyberweapon tool potentially being used to exploit legacy Cisco PIX firewalls.
As Cisco explained on its website, its IOS Software is the most widely used network infrastructure software in the world. Due to its large deployment, Cisco's software platform is an attractive target for malicious hackers.
The networking company also said that at the moment there are no workarounds for this vulnerability. IT administrators are advised to closely monitor their systems until Cisco releases patches for its software.
Cisco Takes Measures Against NSA Exploit Cyberweapon
Cisco rolls out patches for its firewalls vulnerable to NSA's cyberweapon.
Cisco To Cut Jobs While Moving Toward Software Business
Cisco cuts 5,500 jobs, struggling in its transition toward a greater focus on the software business.
Hacking Group Claims To Sell Cyber-Weapons Stolen From NSA
Shadow Brokers hacking group has announced they will auction stolen surveillance tools claimed to have been used by the U.S. National Security Agency.
MORE IN ITECHPOST
What are the Different Types Of SD Cards?
Most of us use digital cameras, smartphones, and camcorders. But often we lack storage spaces. Thus,we often have to delete our precious memories. But not now. This is because SD cards are available in the market. I'm sure all of you must have seen an SD card. But do you know, SD cards are of different types?
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Game Developers’ Different Roles in the Studio
Learn about the different professionals involved in developing video games. Becoming a game developer is one of the coolest jobs around and your 14-year-old self, perched on the edge of your bed as you play PlayStation, will thank you for making such an awesome career move.
A COMPREHENSIVE REVIEW ON TIMOTHY SYKES: Is He a Scam Artist?
Timothy Sykes has garnered a lot of attention from several people. A lot of these reactions have been positive, while others have been negative - this is based on the bold claims and flamboyant lifestyle he has always showcased. In this review, we will take a deep dive into his life and the training programs he has to offer. Via this review, you will come to a conclusion whether he is the real deal or another fishy scam artist. First and foremost, we will be uncovering the man himself, Timothy Sykes, also known as Tim Sykes.