CERT-In strongly recommends that users of the affected Cisco products promptly apply the updates
The Indian Computer Emergency Response Team (CERT-In), operating under the Ministry of Electronics & Information Technology, has issued an advisory regarding two critical vulnerabilities in Cisco's ConfD CLI product. These vulnerabilities could enable attackers to gain root privileges on the underlying operating system, posing significant security risks. CERT-In's advisory highlights two major vulnerabilities: an "Arbitrary File Read and Write" flaw and a "Privilege Escalation" issue. The former arises from improper authorization enforcement when specific CLI commands are executed. This vulnerability allows an authenticated, low-privileged local attacker to read and write arbitrary files with root-level access by exploiting crafted CLI commands.
The advisory explains, "An attacker could exploit this vulnerability by executing an affected CLI command with crafted arguments," potentially allowing unauthorized access to critical system files. The second vulnerability involves incorrect privilege assignment when certain CLI commands are used, enabling privilege escalation. Exploiting this flaw, an attacker can execute affected CLI commands to gain root privileges on the operating system, significantly increasing the risk of malicious activities.
CERT-In strongly recommends that users of the affected Cisco products promptly apply the updates released by Cisco to mitigate these vulnerabilities. Ensuring that these patches are implemented is crucial for maintaining system security and protecting sensitive data from potential exploits. These vulnerabilities underline the importance of regular software updates and vigilant cybersecurity practices. Organizations using Cisco products should act swiftly to secure their systems against these threats.
.webp)



























.webp)