A vulnerability in the Cisco REST API virtual service container for Cisco IOS XE Software could allow an unauthenticated, remote malicious user to bypass authentication on the managed Cisco IOS XE device. The vulnerability is due to an improper check performed by the area of code that manages the REST API authentication service. An attacker could exploit this vulnerability by submitting malicious HTTP requests to the targeted device. A successful exploit could allow the malicious user to obtain the token-id of an authenticated user. This token-id could be used to bypass authentication and execute privileged actions through the interface of the REST API virtual service container on the affected Cisco IOS XE device. The REST API interface is not enabled by default and must be installed and activated separately on IOS XE devices. See the Details section for more information.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco ios_xe 16.6.5 |
||
cisco ios_xe 15.5\\(3\\)s3.16 |
Plus a Cisco bug, dentists bitten by malware, and France takes down a worm
Roundup This week ended with a bang, thanks to some Twitter hackers. An (as yet) unknown group took over the account of Twitter co-founder and CEO Jack Dorsey for several hours on Friday, filling the billionaire's feed with incoherent and occasionally profane rants. Twitter says it is investigating what happened, but it appears the account was taken over via third-party service Cloudhopper, an app that allows users to send out Tweets via SMS messages. In that case, the hackers could have perform...