{"id":25543,"date":"2024-04-25T13:55:11","date_gmt":"2024-04-25T13:55:11","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=25543"},"modified":"2024-09-23T15:38:43","modified_gmt":"2024-09-23T15:38:43","slug":"a-persistent-threat-critical-vulnerability-in-network-devices","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/","title":{"rendered":"A Persistent Threat: Critical Vulnerability in Network Devices"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/guillermo-pereyra\">Guillermo Pereyra<\/a>, Security Analyst at LACNIC CSIRT<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>A known vulnerability<\/h3>\n\n\n\n<p>In mid-October 2023, CISCO published CVE-2023-20198, a vulnerability that affects the user interface (web UI feature) of Cisco IOS XE software.<\/p>\n\n\n\n<p>This vulnerability allows gaining unauthorized access to an exposed web interface and execute commands for creating a user.<\/p>\n\n\n\n<p>In this article, we will discuss how this vulnerability affects the Latin American and Caribbean region, what measures LACNIC CSIRT is taking, and what we can do to fix this problem.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" width=\"530\" height=\"1024\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-530x1024.png\" alt=\"\" class=\"wp-image-25520\" style=\"width:400px\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-530x1024.png 530w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-155x300.png 155w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-171x330.png 171w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-300x579.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024.png 614w\" sizes=\"(max-width: 530px) 100vw, 530px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>A vulnerability that affects our region<\/h3>\n\n\n\n<p>At LACNIC CSIRT, we&#8217;ve noticed an increase in the number of devices in the region affected by this vulnerability since its publication.<\/p>\n\n\n\n<p>Data shows that an average of 17 compromised devices have been detected daily over the last five months, as illustrated in the graph below.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-a-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-1024x536.png\" alt=\"\" class=\"wp-image-25531\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-a-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-1024x536.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-a-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-300x157.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-a-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-631x330.png 631w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-a-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-768x402.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-a-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-1536x804.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig1-a-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024.png 1598w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Graph #1. Number of compromised network devices over time.<\/figcaption><\/figure>\n\n\n\n<p>An analysis of the data shows that the problem affects approximately 900 different ASNs. In the following graph, it is interesting to see how the problem is concentrated in just a few ASNs.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"572\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig2-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-1024x572.png\" alt=\"\" class=\"wp-image-25523\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig2-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-1024x572.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig2-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-300x167.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig2-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-591x330.png 591w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig2-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-768x429.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig2-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024.png 1444w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Graph #2. Number of compromised devices by ASN based on their assigned IP prefix.<\/figcaption><\/figure>\n\n\n\n<p class=\"alert alert-info\">Although updates and fixes have been available for over five months, thousands of network devices are still vulnerable to this problem.<\/p>\n\n\n\n<p>Actions taken by LACNIC CSIRT<\/p>\n\n\n\n<p>The LACNIC response team informs organizations with an exposed IOS XE web service that they might be vulnerable.<\/p>\n\n\n\n<p>We alert them through the MiLACNIC security module so that the organization can identify and mitigate any possible threat that may be occurring on their networks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"635\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig3-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-1024x635.png\" alt=\"\" class=\"wp-image-25526\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig3-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-1024x635.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig3-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-300x186.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig3-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-532x330.png 532w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig3-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-768x476.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig3-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024-1536x953.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/fig3-amenaza-persistente-vulnerabilidad-critica-en-dispositivo-de-red-2024.png 1786w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 1. Example of the information displayed by MiLACNIC.<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>Detecting and fixing the vulnerability<\/h3>\n\n\n\n<p>How do I know if my device is vulnerable?<\/p>\n\n\n\n<p>A device is vulnerable if the web interface of the following IOS XE versions is exposed:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>CPE configuration<\/strong><\/th><th><strong>Affected version<\/strong> <strong>(from)<\/strong><\/th><th><strong>Affected version (up to and including)<\/strong><\/th><\/tr><\/thead><tbody><tr><td>&nbsp; cpe:2.3:o:cisco:ios_xe:*:*:*:*: *:*:*:*<\/td><td>16.12<\/td><td>16.12.10a<\/td><\/tr><tr><td>&nbsp; cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*<\/td><td>17.3<\/td><td>17.3.8a<\/td><\/tr><tr><td>&nbsp; cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*<\/td><td>17.6<\/td><td>17.6.6a<\/td><\/tr><tr><td>&nbsp; cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*<\/td><td>17.9<\/td><td>17.9.4a<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Has my device been attacked?<\/p>\n\n\n\n<p>The verifications recommended by TALOS, CISCO&#8217;s security team, include:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Check the system logs for the presence of any message that includes the &#8220;user&#8221; field associated with an unknown user.<\/li>\n<\/ol>\n\n\n\n<p class=\"alert alert-neutral\">%SYS-5-CONFIG_P: Configured programmatically by process SEP_webui_wsma_http from console as user on line<\/p>\n\n\n\n<p class=\"alert alert-neutral\">%SEC_LOGIN-5-WEBLOGIN_SUCCESS: Login Success [user: user] [Source: source_IP_address] at 03:42:13 UTC Wed Oct 11 2023<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check the system logs for any unknown files in the \u201cfilename\u201d field:<\/li>\n<\/ul>\n\n\n\n<p class=\"alert alert-neutral\">%WEBUI-6-INSTALL_OPERATION_INFO: User: username, Install Operation: ADD filename<\/p>\n\n\n\n<p>How can I fix this?<\/p>\n\n\n\n<p>To fix the problem, the recommendation is to update the devices. Temporarily disabling web management until the proper update has been installed or reducing exposure by blocking access to the Internet can be used as mitigating measures. For more information on how to mitigate this risk, we recommend visiting the CISCO website (included under References).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Summary<\/h2>\n\n\n\n<p>The number of devices affected by the CVE-2023-20198 and CVE-2023-20273 vulnerabilities is on the rise in Latin America and the Caribbean. Although these vulnerabilities were identified and fixed five months ago, many devices remain vulnerable. Several proofs of concept and exploits have been published for these vulnerabilities. This leads to an increase in attacks by malicious actors.<\/p>\n\n\n\n<p>At LACNIC CSIRT, we have been actively working to address this problem by using tools such as MiLACNIC to alert organizations to the risks and help detect and mitigate potential threats on their networks. It is important for organizations to take steps to protect their devices, including updating their software or implementing the recommended mitigation measures.<\/p>\n\n\n\n<p>We also request that you disseminate this article among organizations that may be using these devices.<\/p>\n\n\n\n<p><strong>RECOMMENDATION<\/strong><\/p>\n\n\n\n<p>Organizations are urged to immediately install any applicable updates.<\/p>\n\n\n\n<p><strong>References:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-iosxe-webui-privesc-j22SaA4z\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-iosxe-webui-privesc-j22SaA4z<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/blog.talosintelligence.com\/active-exploitation-of-cisco-ios-xe-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/blog.talosintelligence.com\/active-exploitation-of-cisco-ios-xe-software\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/csirt.lacnic.net\/articulos-y-novedades\/modulo-de-seguridad-de-milacnic\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/csirt.lacnic.net\/articulos-y-novedades\/modulo-de-seguridad-de-milacnic<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Guillermo Pereyra, Security Analyst at LACNIC CSIRT A known vulnerability In mid-October 2023, CISCO published CVE-2023-20198, a vulnerability that affects the user interface (web UI feature) of Cisco IOS XE software. This vulnerability allows gaining unauthorized access to an exposed web interface and execute commands for creating a user. In this article, we will [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":25547,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,1451],"taxonomy-authors":[1245],"tipo_autor":[],"class_list":["post-25543","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-highlights-2023","taxonomy-authors-guillermo-pereyra-en"],"acf":{"author":"Guillermo Pereyra, Security Analyst at LACNIC CSIRT","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | A Persistent Threat: Critical Vulnerability in Network Devices<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | A Persistent Threat: Critical Vulnerability in Network Devices\" \/>\n<meta property=\"og:description\" content=\"By Guillermo Pereyra, Security Analyst at LACNIC CSIRT A known vulnerability In mid-October 2023, CISCO published CVE-2023-20198, a vulnerability that affects the user interface (web UI feature) of Cisco IOS XE software. This vulnerability allows gaining unauthorized access to an exposed web interface and execute commands for creating a user. In this article, we will [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-25T13:55:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-23T15:38:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/vulnerabilidad-dispositivos-de-red-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"A Persistent Threat: Critical Vulnerability in Network Devices\",\"datePublished\":\"2024-04-25T13:55:11+00:00\",\"dateModified\":\"2024-09-23T15:38:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/\"},\"wordCount\":655,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/vulnerabilidad-dispositivos-de-red-2024.png\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/\",\"name\":\"LACNIC Blog | A Persistent Threat: Critical Vulnerability in Network Devices\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/vulnerabilidad-dispositivos-de-red-2024.png\",\"datePublished\":\"2024-04-25T13:55:11+00:00\",\"dateModified\":\"2024-09-23T15:38:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/vulnerabilidad-dispositivos-de-red-2024.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/vulnerabilidad-dispositivos-de-red-2024.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Persistent Threat: Critical Vulnerability in Network Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | A Persistent Threat: Critical Vulnerability in Network Devices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | A Persistent Threat: Critical Vulnerability in Network Devices","og_description":"By Guillermo Pereyra, Security Analyst at LACNIC CSIRT A known vulnerability In mid-October 2023, CISCO published CVE-2023-20198, a vulnerability that affects the user interface (web UI feature) of Cisco IOS XE software. This vulnerability allows gaining unauthorized access to an exposed web interface and execute commands for creating a user. In this article, we will [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-04-25T13:55:11+00:00","article_modified_time":"2024-09-23T15:38:43+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/vulnerabilidad-dispositivos-de-red-2024.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"A Persistent Threat: Critical Vulnerability in Network Devices","datePublished":"2024-04-25T13:55:11+00:00","dateModified":"2024-09-23T15:38:43+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/"},"wordCount":655,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/vulnerabilidad-dispositivos-de-red-2024.png","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/","url":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/","name":"LACNIC Blog | A Persistent Threat: Critical Vulnerability in Network Devices","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/vulnerabilidad-dispositivos-de-red-2024.png","datePublished":"2024-04-25T13:55:11+00:00","dateModified":"2024-09-23T15:38:43+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/vulnerabilidad-dispositivos-de-red-2024.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/vulnerabilidad-dispositivos-de-red-2024.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/a-persistent-threat-critical-vulnerability-in-network-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"A Persistent Threat: Critical Vulnerability in Network Devices"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/04\/vulnerabilidad-dispositivos-de-red-2024.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":25517,"post_title":"Amenaza persistente: vulnerabilidad cr\u00edtica en dispositivos de red","slug":"amenaza-persistente-vulnerabilidad-critica-en-dispositivos-de-red","href":"https:\/\/blog.lacnic.net\/amenaza-persistente-vulnerabilidad-critica-en-dispositivos-de-red\/"},{"locale":"pt_BR","id":25553,"post_title":"Amea\u00e7a persistente: vulnerabilidade cr\u00edtica em dispositivos de rede","slug":"ameaca-persistente-vulnerabilidade-critica-em-dispositivos-de-rede","href":"https:\/\/blog.lacnic.net\/pt-br\/ameaca-persistente-vulnerabilidade-critica-em-dispositivos-de-rede\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/25543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=25543"}],"version-history":[{"count":4,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/25543\/revisions"}],"predecessor-version":[{"id":27328,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/25543\/revisions\/27328"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/25547"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=25543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=25543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=25543"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=25543"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=25543"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=25543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}