The US Cybersecurity and Infrastructure Security Agency (CISA) has added two Cisco and four Gigabyte product flaws to its Known Exploited Vulnerabilities catalog. Only one of the Gigabyte vulnerabilities was previously mentioned as being involved in attacks.
The Cisco product vulnerabilities are CVE-2020-3433 and CVE-2020-3153, and they both impact the AnyConnect Secure Mobility Client for Windows. They can be exploited by a local, authenticated attacker to execute arbitrary code and copy files to arbitrary locations with elevated privileges.
Details and proof-of-concept (PoC) code are available for both flaws, but SecurityWeek could not find any public reports describing exploitation of the vulnerabilities. Cisco’s advisories for CVE-2020-3433 and CVE-2020-3153 currently claim that the company is not aware of malicious exploitation.
However, CISA clarified in the past that it only adds vulnerabilities to its catalog if it has reliable evidence of exploitation. In addition, this is not the only time CISA has been the first to warn about a Cisco product vulnerability being exploited.
Given that the two security holes can only be exploited by an authenticated attacker, they are likely leveraged as part of a complex, multi-stage attack.
As for the Gigabyte vulnerabilities, they impact GPCIDrv and GDrv low-level drivers in the Gigabyte App Center, the Aorus graphics engine, the Xtreme gaming engine, and the OC Guru utility.
The vulnerabilities are tracked as CVE-2018-19323, CVE-2018-19322, CVE-2018-19321 and CVE-2018-19320, and they can allow a local attacker to escalate privileges and potentially take complete control of the system.
While the bugs have a 2018 CVE, Gigabyte initially told the researchers who discovered them that its products were not impacted. The motherboard manufacturer changed course in 2020 and took action to address the issues.
However, by the time Gigabyte released a security advisory for the vulnerabilities, Sophos had reported that a Gigabyte driver affected by CVE-2018-19320 had been exploited by Robinhood ransomware to remove security products from targeted devices before encrypting files.
There do not appear to be any other reports describing exploitation of the Gigabyte driver vulnerabilities, but technical details, PoC exploits and documents describing how they can be weaponized are publicly available.
Related: XSS Vulnerability in Cisco Security Products Exploited in the Wild
Related: Chinese UEFI Rootkit Found on Gigabyte and Asus Motherboards
Related: CISA: Vulnerability in Delta Electronics ICS Software Exploited in Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
Latest News
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- How the Atomized Network Changed Enterprise Protection
- Critical QNAP Vulnerability Leads to Code Injection
- Saviynt Raises $205M; Founder Rejoins as CEO
- OpenVEX Spec Adds Clarity to Supply Chain Vulnerability Warnings
- GitHub Revokes Code Signing Certificates Following Cyberattack
- Russian Millionaire on Trial in Hack, Insider Trade Scheme
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
