Talos flags a security issue on Cisco's Smart Install clients
Cisco Talos warned its users about attackers who use publicly available tool to have unauthenticated access to customer configuration details in Cisco' s Smart Install. The team at Talos fears that the attackers use an app which goes by the name Smart Install Exploitation Tool, a tool available on Github, for scanning the clients.
Also, Talos believes that the attackers may possess good knowledge of Smart Install Protocol which helps them to fish out customer configurations from affected devices.
Cisco Smart Install is a component of the Cisco Smart Operations solution that helps manage LAN switches.
“ The attack leverages a known issue with the Smart Install protocol. Cisco PSIRT has published a security response to this activity. Abuse of the Smart Install protocol can lead to modification of the TFTP server setting, exfiltration of configuration files via TFTP, replacement of IOS image and potentially execution of IOS commands,” Talos reported.
Although, cisco does not consider the issue as an actual vulnerability, it is seen as a misuse of the Smart Install protocol, which does not require authentication by design and the company has updated the Smart Install Configuration Guide to include best security practices.
Comments ( 0 )
No comments available