Network Security, Patch/Configuration Management, Vulnerability Management

Cisco advises firewall users to patch critical vulnerability

Cisco yesterday warned users of a critical vulnerability in the web-based interface of its EV220W Wireless Network Security Firewall devices, which if exploited could allow remote attackers to access administrative privileges by circumventing the authentication process.

In an online security advisory, the networking technology provider assured readers that it has already made firmware updates and software patches available to address the flaw.

Cisco warned users to look out for indicators of a compromise, specifically If the “Authentication, Accounting, and Authorization (AAA) log files for a device contain suspect or malicious login data.”

The company attributed the vulnerability to “insufficient input validation of HTTP request headers" that get sent to the interface of affected devices. This flaw could allow a hacker to send devices a crafted HTTP request, encoded with malicious SQL statements, in order to leverage their remote access capabilities and subsequently alter user privileges.

Bradley Barth

As director of community content at CyberRisk Alliance, Bradley Barth develops content for SC Media online conferences and events, as well as video/multimedia projects. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.