By using this site, you agree to the Privacy Policy and Terms of Use.
Accept

Tec Informer

Tech news, Tips, tutorials , health tips and job circular

  • Latest
  • Mobile
  • Gadgets
  • Internet
  • Virtual reality
  • Artificial intelligence
  • Computing
Search here
Notification Show More
Aa
Aa

Tec Informer

Tech news, Tips, tutorials , health tips and job circular

Search here
  • Latest
  • Mobile
  • Gadgets
  • Internet
  • Virtual reality
  • Artificial intelligence
  • Computing
Follow US
2023 © TECINFORMER All Rights Reserved
Tec Informer > Tech News > Cisco releases urgent patch for flaw that could let hackers access Emergency Response Systems -TECINFORMER
Tech News

Cisco releases urgent patch for flaw that could let hackers access Emergency Response Systems -TECINFORMER

Tecinformer
Last updated: 2023/10/06 at 1:39 PM
Tecinformer
Share
2 Min Read
cisco logo
SHARE

Contents
Hardcoded credentialsMore from TechRadar Pro

Cisco Emergency Responder (CER), the company’s emergency communication system used to respond to crises in a timely manner, had hardcoded credentials, allowing hackers with knowledge of this fact easy access to the systems.

The news was confirmed by the company itself, which recently released a new patch to address the problem.

The vulnerability is tracked as CVE-2023-20101 and comes with a severity score of 9.8. “An attacker could exploit this vulnerability by using the account to log in to an affected system,” Cisco said in an advisory. “A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.”

Hardcoded credentials

Hardcoded login credentials aren’t exactly a new thing. Developers sometimes use them to make logging in easier during development. The problem is when the devs forget to remove them before shipping the product out.

The flaw is found in Cisco Emergency Responder 12.5(1)SU4, and those who use it should make sure they bring the software up to version 12.5(1)SU5. Other releases were not vulnerable, it was said.

The good news is that Cisco is under the impression that no one managed to abuse the flaw yet. The company discovered it during internal security testing and has no reason to believe someone beat it to the punch.

However, now that the cat is out of the bag, it’s safe to assume that different threat actor groups will try and abuse the flaw. That is why keeping software up-to-date is one of the most important cybersecurity practices today. Most of cyberattacks and hacks these days are not done through zero-days (flaws for which the developers had zero days to fix), but rather old vulnerabilities that software users never got to patch. 

Having endpoint protection solutions, as well as firewalls, installed, wouldn’t hurt, either.

More from TechRadar Pro

Read the full article here

Share This Article
Facebook Twitter Copy Link Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

You Might Also Like

Gmail wants to win the war on junk mail, adds AI spam detection
Tech News

Gmail wants to win the war on junk mail, adds AI spam detection -TECINFORMER

December 6, 2023
Morgan XP-1
Tech News

Morgan signals its EV future with experimental XP-1 plug-in three-wheeler -TECINFORMER

December 6, 2023
Apple and Paramount Hold Talks to Combine Streaming Services
Tech News

Apple and Paramount Hold Talks to Combine Streaming Services -TECINFORMER

December 5, 2023
Data Breach
Tech News

Thousands of victims hit in attack on chocolate maker Hershey -TECINFORMER

December 5, 2023
Follow US
2023 © TECINFORMER All Rights Reserved
  • Disclaimer
  • Terms
  • Contact Us
  • About us
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?