UPDATED 04:46 EDT / MARCH 21 2017

INFRA

Cisco discloses 300+ switches vulnerable to CIA hack, with no patch available

In a damaging public disclosure, Cisco Systems Inc. has admitted that more than 300 of the switches it sells contain a critical vulnerability that allows the Central Intelligence Agency to take full control of the devices, but there is currently no patch available to fix the critical vulnerability.

The revelation follows WikiLeaks’ disclosure of the CIA’s hacking tools two weeks ago that included details of tools the agency uses to access smartphones, routers and even smart television sets.

Cisco issued a security advisory detailing the vulnerability, describing it as an issue in the Cisco Cluster Management Protocol processing code in Cisco IOS and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.

“An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections,” the company noted. “An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device.”

Cisco listed Catalyst switches as being affected the most by the problem, but also Industrial Ethernet switches and embedded services.

While there is currently no way to patch the switch firmware to prevent an attack, all hope is not lost. Cisco said disabling telnet as a means for receiving incoming connections eliminates the threat. Users who aren’t willing to disable telnet can lower the risk of the CIA or others gaining access by using an access control list to restrict the devices that are allowed to send and receive telnet commands.

Cisco added that it was working on a fix for the vulnerability, but at this stage there is no set date as to when it might be available.

Photo: Ben Franske/Wikimedia Commons

Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.