The US Cybersecurity and Infrastructure Security Agency (CISA) has added two Cisco and four Gigabyte product flaws to its Known Exploited Vulnerabilities catalog. Only one of the Gigabyte vulnerabilities was previously mentioned as being involved in attacks.
The Cisco product vulnerabilities are CVE-2020-3433 and CVE-2020-3153, and they both impact the AnyConnect Secure Mobility Client for Windows. They can be exploited by a local, authenticated attacker to execute arbitrary code and copy files to arbitrary locations with elevated privileges.
Details and proof-of-concept (PoC) code are available for both flaws, but SecurityWeek could not find any public reports describing exploitation of the vulnerabilities. Cisco’s advisories for CVE-2020-3433 and CVE-2020-3153 currently claim that the company is not aware of malicious exploitation.
However, CISA clarified in the past that it only adds vulnerabilities to its catalog if it has reliable evidence of exploitation. In addition, this is not the only time CISA has been the first to warn about a Cisco product vulnerability being exploited.
Given that the two security holes can only be exploited by an authenticated attacker, they are likely leveraged as part of a complex, multi-stage attack.
As for the Gigabyte vulnerabilities, they impact GPCIDrv and GDrv low-level drivers in the Gigabyte App Center, the Aorus graphics engine, the Xtreme gaming engine, and the OC Guru utility.
The vulnerabilities are tracked as CVE-2018-19323, CVE-2018-19322, CVE-2018-19321 and CVE-2018-19320, and they can allow a local attacker to escalate privileges and potentially take complete control of the system.
While the bugs have a 2018 CVE, Gigabyte initially told the researchers who discovered them that its products were not impacted. The motherboard manufacturer changed course in 2020 and took action to address the issues.
However, by the time Gigabyte released a security advisory for the vulnerabilities, Sophos had reported that a Gigabyte driver affected by CVE-2018-19320 had been exploited by Robinhood ransomware to remove security products from targeted devices before encrypting files.
There do not appear to be any other reports describing exploitation of the Gigabyte driver vulnerabilities, but technical details, PoC exploits and documents describing how they can be weaponized are publicly available.
Related: XSS Vulnerability in Cisco Security Products Exploited in the Wild
Related: Chinese UEFI Rootkit Found on Gigabyte and Asus Motherboards
Related: CISA: Vulnerability in Delta Electronics ICS Software Exploited in Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Zyxel Firewalls Hacked by Mirai Botnet
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations
- Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances
- OAuth Vulnerabilities in Widely Used Expo Framework Allowed Account Takeovers
- New Honeywell OT Cybersecurity Solution Helps Identify Vulnerabilities, Threats
- Rheinmetall Says Military Business Not Impacted by Ransomware Attack
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
