Cisco Products Security Flaw, aka: “ThrangryCat”

CMIT Solutions experts discovered a security flaw in nearly all of Cisco’s networking products manufactured since 2013.

The flaw allows a “backdoor” to be implanted on affected devices. Unauthorized processes are able to update code in the Trusted Anchor module (Cisco’s version of TPM), bypass SecureBoot features, disabling security functionality and locking out future software updates to the TAm.

Cisco documents the flaw here: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot.

This vulnerability cannot be exploited remotely, so Cisco has downplayed it.  However, security research has linked the vulnerability https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-webui which does allow remote exploitation of the flaw, using the IOS web interface.

Security researchers believe that these internal flaws in the design make it unlikely that a patch will resolve the issue, making it more important that devices be kept up to date with other security patches, particularly those patches addressing remote code execution.  Edge devices will be particularly vulnerable if not patched, and could allow a persistent presence in your, or your clients’ networks.

Contact CMIT Solutions of Stamford with any concerns, or to check if your Cisco devices are up to date and as secure as possible: 203-595-9091 Opt 2.

With Vincent Dentice, CMIT Solutions Marietta GA

Back to Blog

Share:

Related Posts

Using OneDrive to Manage Data Sharing

Data sharing is critical in today’s business world. Projects are no longer…

Read More

Microsoft Access Joins Office 365 Business Suite

Microsoft Access The Microsoft Office family is getting bigger and better: Microsoft…

Read More

Transition From On-Site to Cloud with Microsoft

Traditionally, software companies have provided their services through software licenses. Each computer…

Read More