August 9, 2024 at 02:21AM
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has raised concerns about threat actors exploiting vulnerabilities in Cisco network devices, particularly targeting the legacy Smart Install feature. CISA emphasizes the need for strong password protection and reviews of NSA guidance. Cisco has also warned about critical flaws in certain products and their impact.
Key takeaways from the meeting notes:
– The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has highlighted threat actors exploiting the legacy Cisco Smart Install (SMI) feature to access sensitive data and system configuration files.
– CISA recommends ensuring all passwords on network devices are stored using a sufficient level of protection, particularly recommending type 8 password protection for all Cisco devices.
– Enterprises are urged to review the National Security Agency’s (NSA) Smart Install Protocol Misuse advisory and Network Infrastructure Security Guide for configuration guidance.
– Cisco has warned about critical vulnerabilities in Smart Software Manager On-Prem and Small Business SPA300 Series and SPA500 Series IP Phones, which could allow attackers to execute arbitrary commands or cause a denial-of-service condition.
– The affected devices have reached end-of-life (EoL) status, and Cisco does not intend to release software updates, necessitating that users transition to newer models.
For further details and to stay updated, follow Cisco’s official channels on Twitter and LinkedIn.