Cisco bug lets hackers run commands as root on UWRB access points

Teilen:

Cisco has fixed a maximum severity vulnerability that allows attackers to run commands with root privileges on vulnerable Ultra-Reliable Wireless Backhaul (URWB) access points that provide connectivity for industrial wireless automation.

Tracked as CVE-2024-20418, this security flaw was found in Cisco’s Unified Industrial Wireless Software’s web-based management interface. Unauthenticated threat actors can exploit it in low-complexity command injection attacks that don’t require user interaction.

“This vulnerability is due to improper validation of input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system,” Cisco said in a security advisory published on Wednesday.

“A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system of the affected device.”

As the company explains, the vulnerability impacts Catalyst IW9165D Heavy Duty Access Points, Catalyst IW9165E Rugged Access Points and Wireless Clients, and Catalyst IW9167E Heavy Duty Access Points, but only if they’re running vulnerable software and have the URWB operating mode enabled.

Cisco’s Product Security Incident Response Team (PSIRT) has yet to discover evidence of publicly available exploit code or that this critical security flaw has been exploited in attacks.

Admins can determine if the URWB operating mode is enabled by checking if the “show mpls-config” CLI command is available. If the command is not available, URWB is disabled, and the device will not be affected by this vulnerability.

Cisco also fixed a denial-of-service flaw in its Cisco ASA and Firepower Threat Defense (FTD) software in July, which was discovered in April while exploited in large-scale brute-force attacks targeting Cisco VPN devices.

One month earlier, the company released security updates to address another command injection vulnerability with public exploit code that lets attackers escalate privileges to root on vulnerable systems.

​In July, CISA and the FBI urged software companies to eliminate path OS command injection vulnerabilities before shipping in response to recent attacks where Cisco, Palo Alto, and Ivanti network edge devices were compromised by exploiting multiple OS command injection security flaws (CVE-2024-20399, CVE-2024-3400, and CVE-2024-21887).

Sergiu Gatlan

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
10:51 pm, Juni 28, 2025
Wetter-Symbol 23°C
L: 21° | H: 24°
klarer Himmel
Luftfeuchtigkeit: 73 %
Druck: 1025 mb
Wind: 10 mph WSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 0%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:45 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Tomorrow 10:00 pm
Wetter-Symbol
21° | 24°°C 0 mm 0% 7 mph 81 % 1026 mb 0 mm/h
Mo. Juni 30 10:00 pm
Wetter-Symbol
20° | 34°°C 1 mm 100% 6 mph 66 % 1022 mb 0 mm/h
Di. Juli 01 10:00 pm
Wetter-Symbol
20° | 32°°C 0.77 mm 77% 11 mph 68 % 1019 mb 0 mm/h
Mi. Juli 02 10:00 pm
Wetter-Symbol
16° | 24°°C 1 mm 100% 12 mph 89 % 1019 mb 0 mm/h
Do. Juli 03 10:00 pm
Wetter-Symbol
15° | 22°°C 0 mm 0% 15 mph 81 % 1022 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
20° | 22°°C 0 mm 0% 7 mph 74 % 1024 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
18° | 20°°C 0 mm 0% 5 mph 81 % 1025 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 5 mph 81 % 1026 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
23° | 23°°C 0 mm 0% 4 mph 58 % 1026 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
28° | 28°°C 0 mm 0% 5 mph 43 % 1025 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
30° | 30°°C 0 mm 0% 3 mph 35 % 1023 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
30° | 30°°C 0 mm 0% 1 mph 34 % 1021 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
24° | 24°°C 0 mm 0% 6 mph 56 % 1022 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,532.15
0.08%
Ethereum(ETH)
€2,075.40
0.35%
Fesseln(USDT)
€0.85
-0.01%
XRP(XRP)
€1.86
1.85%
Solana(SOL)
€128.44
5.28%
USDC(USDC)
€0.85
-0.01%
Dogecoin(DOGE)
€0.139750
1.58%
Shiba Inu(SHIB)
€0.000010
2.07%
Pepe(PEPE)
€0.000008
3.82%
Nach oben scrollen