Security

Patches

Cisco scores a perfect CVSS 10 with critical flaw in its wireless system

Ultra-Reliable Wireless Backhaul doesn't live up to its name


Cisco is issuing a critical alert notice about a flaw that makes its so-called Ultra-Reliable Wireless Backhaul systems easy to subvert.

The weakness – dubbed CVE-2024-20418 and made public yesterday – is with the Unified Industrial Wireless Software that the devices use. Crucially, the flaw is serious enough that a remote attacker with no privileges could upgrade themselves to admin-level access and install whatever nasties they like.

"An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system," Cisco warned. "A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system of the affected device."

The following kit is affected and needs immediate patching if URWB is enabled – there are no workarounds:

You can check if it is enabled on your own kit by using the show mpls-config CLI command.

The flaw carries a CVSS score of 10.0 because it's both simple and devastatingly effective. It's also dangerous because this kind of kit is designed for industrial uses and it is just the kind of code you'd expect to find in critical infrastructure targets – such as ports or factories.

You can get your fix here and are advised to apply it immediately. There are not yet any reported sightings of the vulnerability being exploited in the wild. ®

Send us news
16 Comments

Next-gen Wi-Fi to trade ludicrous speed for the boring art of actually working

Eighth generation of the standard is all about ultra reliability

Microsoft fixes under-attack privilege-escalation holes in Hyper-V

Plus: Excel hell, angst for Adobe fans, and life's too Snort for Cisco

Nominet probes network intrusion linked to Ivanti zero-day exploit

Unauthorized activity detected, but no backdoors found

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Cryptojacking, backdoors abound as fiends abuse Aviatrix Controller bug

This is what happens when you publish PoCs immediately, hm?

BT unplugs plans to turn old cabinets into EV chargepoints

Your battery might be flat, but the Wi-Fi signal is going to be great

Six vulnerabilities in ubiquitous rsync tool announced and fixed in a day

Turns out tool does both file transfers and security fixes fast

Zero-day exploits plague Ivanti Connect Secure appliances for second year running

Factory resets and apply patches is the advice amid fortnight delay for other appliances

MediaTek rings in the new year with a parade of chipset vulns

Manufacturers should have had ample time to apply the fixes

Screwed by the cloud: Hardware vendors looking for that raison d'refresh

40% of world's servers are 6 years +, drink 66% of DC energy, provide 7% of compute. Please refresh, says HPE

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

China's homebrew Bluetooth alternative is on the march as Beijing pushes universal remotes

'Star Flash' is said to include 5G tech and leave rival wireless protocols struggling in the crack of a sofa