Cisco on Wednesday announced that it has patched several vulnerabilities affecting its products, including flaws in Small Business routers and switches.
Of the eight vulnerabilities for which Cisco published an advisory this week, only CVE-2020-3297 has been rated high severity. This security hole affects some Small Business and managed switches and it allows a remote, unauthenticated attacker to access a device’s management interface by hijacking a legitimate user’s session.
“The vulnerability is due to the use of weak entropy generation for session identifier values,” Cisco explained in an advisory. “An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.”
Cisco also informed customers that it has patched a medium-severity cross-site scripting (XSS) vulnerability in its Small Business RV042 and RV042G routers.
CyCognito, whose researchers discovered this flaw, published a blog post describing its findings on Thursday morning. The company told SecurityWeek that the flaw is a reflected XSS and exploitation involves getting the targeted user to click on a specially crafted link.
“An XSS vulnerability in a router’s admin interface means router administrators would be the most likely attack targets,” CyCognito explained. “Attackers would be able to perform actions that an admin could, view information that they could (including their keystrokes, their browser history, clipboard, etc.), modify information, and potentially steal and use admin authentication information to access the vulnerable router at will, or attempt to access other systems using those credentials (i.e., move laterally).”
The remaining vulnerabilities for which Cisco published advisories this week are medium-severity issues affecting the Identity Services Engine, Digital Network Architecture Center, Unified Customer Voice Portal, Unified Communications Manager, and the AnyConnect Secure Mobility Client for macOS.
These security holes can be exploited for DoS and XSS attacks, and to obtain potentially sensitive information. Some of them can be exploited remotely without authentication.