Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Cyber Attacks»Massive Cybersecurity Breach: Over 10,000 Cisco Devices Compromised in Zero-Day Attacks

    Massive Cybersecurity Breach: Over 10,000 Cisco Devices Compromised in Zero-Day Attacks

    By NotesleuNo Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    In a startling revelation, cybercriminals have successfully exploited a critical zero-day vulnerability, identified as CVE-2023-20198, to compromise and infiltrate more than 10,000 Cisco IOS XE devices with malicious implants. The affected devices span across various products running Cisco IOS XE software, including enterprise switches, aggregation and industrial routers, access points, wireless controllers, and more.

    Leading threat intelligence firm VulnCheck discovered that the vulnerability was extensively exploited in attacks specifically targeting Cisco IOS XE systems equipped with the Web User Interface (Web UI) feature, alongside enabled HTTP or HTTPS Server features. The company conducted scans on internet-facing Cisco IOS XE web interfaces, revealing thousands of compromised hosts. VulnCheck has even released a specialized scanner designed to identify these implants on affected devices.

    Jacob Baines, CTO of VulnCheck, expressed serious concerns, stating, “Cisco buried the lede by not mentioning thousands of internet-facing IOS XE systems have been implanted. This is a bad situation, as privileged access on the IOS XE likely allows attackers to monitor network traffic, pivot into protected networks, and perform any number of man-in-the-middle attacks.”

    VulnCheck has, so far, identified approximately 10,000 implanted systems through fingerprinting. However, this number is expected to rise as their investigation unfolds. A search on Shodan, shared by Aves Netsec CEO Simo Kohonen, currently reveals over 140,000 Internet-exposed devices with Cisco’s Web UI enabled.

    Cisco has urged administrators to implement mitigation measures promptly. They revealed that unauthenticated attackers can exploit the IOS XE zero-day to gain full administrator privileges, enabling them to remotely take complete control over compromised Cisco routers and switches. Cisco strongly advised disabling the vulnerable HTTP server feature on all internet-facing systems until an official patch is released.

    The company detected the CVE-2023-20198 attacks in late September after reports of unusual behavior on a customer device were received by Cisco’s Technical Assistance Center (TAC). Evidence suggests that the attackers initiated their activities on September 18, creating local user accounts named “cisco_tac_admin” and “cisco_support.” The attackers deployed malicious implants using CVE-2021-1435 exploits and other undisclosed methods, granting them the ability to execute arbitrary commands at the system or IOS levels on compromised devices.

    Cisco suspects that these clusters of activities were orchestrated by the same threat actor. The first cluster possibly served as the actor’s initial attempt and testing their code, while the October activity indicated an expansion of their operation, establishing persistent access through the deployment of the implant.

    The company has issued a stern recommendation for administrators to remain vigilant and scrutinize suspicious or recently created user accounts, as these might indicate malicious activity associated with this threat. This incident follows a prior warning from Cisco in September, urging customers to patch another zero-day vulnerability (CVE-2023-20109) in its IOS and IOS XE software, which had also been targeted by attackers in the wild.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 53
    Featured
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCutting-Edge AI Algorithm Thwarts Cyberattacks on Unmanned Military Vehicles
    Next Article Google Enhances Android Security with Real-Time Code-Level Scanning in Play Protect

    Related Posts

    Cyber Attacks December 26, 2025

    2 Million Affected by SQL Injection and XSS Data Breach

    December 26, 2025
    Cyber Attacks December 26, 2025

    Cybersecurity Experts Uncover ToddyCat’s Expanded Arsenal of Data Theft Tools

    December 26, 2025
    Tech December 26, 2025

    “I Had a Dream” and Generative AI Jailbreaks

    December 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.