November 7, 2024 at 07:02AM
Cisco has issued an alert about a serious vulnerability (CVE-2024-20418) affecting its Ultra-Reliable Wireless Backhaul systems. The flaw allows unauthorized remote access to admin-level control and potential exploitation. Affected models include Catalyst IW9165D/E and IW9167E. Immediate patching is required, with a CVSS score of 10.0.
**Meeting Takeaways on Cisco Critical Alert Notice:**
1. **Flaw Identified**: Cisco has announced a critical vulnerability (CVE-2024-20418) in its Ultra-Reliable Wireless Backhaul (URWB) systems, specifically within the Unified Industrial Wireless Software.
2. **Security Risk**: The vulnerability allows a remote attacker to gain admin-level access without prior privileges through crafted HTTP requests to the management interface, enabling unauthorized command execution with root privileges.
3. **Affected Equipment**: Immediate patching is required for the following devices if URWB is enabled, as there are no alternative workarounds:
– Catalyst IW9165D Heavy Duty Access Points
– Catalyst IW9165E Rugged Access Points and Wireless Clients
– Catalyst IW9167E Heavy Duty Access Points
4. **How to Check**: Users can verify if URWB is enabled on their devices using the command `show mpls-config` in the CLI.
5. **Severity Level**: The flaw has a CVSS score of 10.0, highlighting its critical nature, particularly since it affects equipment used in vital industrial applications, such as ports and factories.
6. **Action Required**: Users are advised to apply the patch immediately, as there have been no reported exploitation incidents in the wild yet.
7. **Patch Availability**: A link for the official patch was provided, and urgent action is recommended to mitigate potential threats.