Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

CISA Warns of Attacks Exploiting Cisco, Gigabyte Vulnerabilities

The US Cybersecurity and Infrastructure Security Agency (CISA) has added two Cisco and four Gigabyte product flaws to its Known Exploited Vulnerabilities catalog. Only one of the Gigabyte vulnerabilities was previously mentioned as being involved in attacks.

The US Cybersecurity and Infrastructure Security Agency (CISA) has added two Cisco and four Gigabyte product flaws to its Known Exploited Vulnerabilities catalog. Only one of the Gigabyte vulnerabilities was previously mentioned as being involved in attacks.

The Cisco product vulnerabilities are CVE-2020-3433 and CVE-2020-3153, and they both impact the AnyConnect Secure Mobility Client for Windows. They can be exploited by a local, authenticated attacker to execute arbitrary code and copy files to arbitrary locations with elevated privileges.

Details and proof-of-concept (PoC) code are available for both flaws, but SecurityWeek could not find any public reports describing exploitation of the vulnerabilities. Cisco’s advisories for CVE-2020-3433 and CVE-2020-3153 currently claim that the company is not aware of malicious exploitation.

However, CISA clarified in the past that it only adds vulnerabilities to its catalog if it has reliable evidence of exploitation. In addition, this is not the only time CISA has been the first to warn about a Cisco product vulnerability being exploited.

Given that the two security holes can only be exploited by an authenticated attacker, they are likely leveraged as part of a complex, multi-stage attack.

As for the Gigabyte vulnerabilities, they impact GPCIDrv and GDrv low-level drivers in the Gigabyte App Center, the Aorus graphics engine, the Xtreme gaming engine, and the OC Guru utility.

The vulnerabilities are tracked as CVE-2018-19323, CVE-2018-19322, CVE-2018-19321 and CVE-2018-19320, and they can allow a local attacker to escalate privileges and potentially take complete control of the system.

While the bugs have a 2018 CVE, Gigabyte initially told the researchers who discovered them that its products were not impacted. The motherboard manufacturer changed course in 2020 and took action to address the issues.

Advertisement. Scroll to continue reading.

However, by the time Gigabyte released a security advisory for the vulnerabilities, Sophos had reported that a Gigabyte driver affected by CVE-2018-19320 had been exploited by Robinhood ransomware to remove security products from targeted devices before encrypting files.

There do not appear to be any other reports describing exploitation of the Gigabyte driver vulnerabilities, but technical details, PoC exploits and documents describing how they can be weaponized are publicly available.

Related: XSS Vulnerability in Cisco Security Products Exploited in the Wild

Related: Chinese UEFI Rootkit Found on Gigabyte and Asus Motherboards

Related: CISA: Vulnerability in ​​Delta Electronics ICS Software Exploited in Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

Former Wiz executive Trish Cagliostro has joined Orchid Security as Chief Revenue Officer.

Transcend has named former UnitedHealth Group CISO Aimee Cardwell as CISO in Residence.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.