Attackers Are Trying to Exploit a High-Severity Zeroday in Cisco Gear
upstart writes in with an IRC submission:
Attackers are trying to exploit a high-severity zeroday in Cisco gear:
Telecoms and data-center operators take note: attackers are actively trying to exploit a high-severity zeroday vulnerability in Cisco networking devices, the company warned over the weekend.
The security flaw resides in Cisco's iOS XR Software, an operating system for carrier-grade routers and other networking devices used by telecommunications and data-center providers. In an advisory published on Saturday, the networking-gear manufacturer said that a patch is not yet available and provided no timeline for when one would be released.
CVE-2020-3566, as the vulnerability is tracked, allows attackers to "cause memory exhaustion, resulting in instability of other processes" including but not limited to interior and exterior routing protocols. Exploits work by sending maliciously crafted Internet Group Management Protocol traffic. Normally, IGMP communications are used by one-to-many networking applications to conserve resources when streaming video and related content. A flaw in the way iOS XR Software queues IGMP packets makes it possible to consume memory resources.
"An attacker could exploit this vulnerability by sending crafted IGMP traffic to an affected device," Saturday's advisory stated. "A successful exploit could allow the attacker to cause memory exhaustion, resulting in instability of other processes. These processes may include, but are not limited to, interior and exterior routing protocols."
[...] The advisory provides indicators that users can check to look for evidence they're under attack. The document says there are no workarounds available to use until a patch can be installed. It does, however, list things administrators can do to mitigate the effects.
Link to the Common Vulnerabilities and Exposures entry for: CVE-2020-3566.
Read more of this story at SoylentNews.