Beware: Hackers Exploiting Legacy Cisco Smart Install Feature

Tech Read Team
2 Min Read




Cisco Smart Install Feature Vulnerability Alert

Aug 09, 2024Ravie LakshmananVulnerability / Network Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that threat actors are exploiting the legacy Cisco Smart Install (SMI) feature in an attempt to gain unauthorized access to sensitive data.

CISA has identified adversaries acquiring system configuration files through the exploitation of available protocols or software on devices, particularly by misusing the legacy Cisco Smart Install feature.

The agency also noted a prevalence of weak password choices on Cisco network devices, leaving them vulnerable to password-cracking attacks. These passwords refer to algorithms used to secure a Cisco device’s password within a system configuration file.

Unauthorized actors who successfully compromise a device can easily access system configuration files, leading to a more thorough breach of victim networks.

CISA emphasized the importance of storing all passwords on network devices with adequate protection, recommending the use of “type 8 password” protection for all Cisco devices to safeguard passwords within configuration files.

Enterprises are urged to consult the National Security Agency’s advisories on Smart Install Protocol Misuse and Network Infrastructure Security Guide for configuration best practices.

Further recommendations include employing strong hashing algorithms for password storage, avoiding password reuse, setting strong and complex passwords, and abstaining from using unaccountable group accounts.

This development coincides with Cisco’s recent warning regarding the availability of proof-of-concept (PoC) code for critical vulnerabilities affecting Smart Software Manager On-Prem and Small Business SPA IP Phones.



Cybersecurity


Cisco has published security advisories detailing critical vulnerabilities in its products, emphasizing the need for users to transition to newer models due to end-of-life status, without plans for software updates.

This underscores the significance of staying vigilant in the face of evolving cyber threats and implementing robust security measures to protect network infrastructure.

Enjoyed this article? Follow us on Twitter and LinkedIn for more exclusive content.




Share This Article
Leave a comment