Category: IT|Aug 8, 2024 | Author: Admin

CISA warns of hackers abusing Cisco Smart Install feature

Share on

​On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recommended disabling the legacy Cisco Smart Install (SMI) feature after seeing it abused in recent attacks.

CISA warns of hackers abusing Cisco Smart Install feature

CISA has spotted threat actors using this tactic and leveraging other protocols or software to steal sensitive data, such as system configuration files, which prompted an alert advising admins to disable the legacy SMI protocol (superseded by the Cisco Network Plug and Play solution) to block these ongoing attacks.

 

It also recommended reviewing the NSA's Smart Install Protocol Misuse Advisory and Network Infrastructure Security Guide for further configuration guidance.

 

In 2018, the Cisco Talos team also warned that the Cisco SMI protocol was being abused to target Cisco switches in attacks linked to multiple hacking groups, including the Russian-backed Dragonfly APT group (also tracked as Crouching Yeti and Energetic Bear).

 

The attackers took advantage of switch owners' failure to configure or disable the protocol, which left the SMI client running and waiting for "installation/configuration" commands.

 

Vulnerable switches allowed the threat actors to alter configuration files, replace the IOS system image, add rogue accounts, and exfiltrate information via the TFTP protocol.

 

In February 2017 and February 2018, Cisco warned customers that malicious actors were actively scanning for Internet-exposed SMI-enabled Cisco devices.

 

Abuse of weak password types


Admins were also advised today to implement better password protection measures after CISA found that attackers exploit weak password types to compromise Cisco network devices.

 

"A Cisco password type is the type of algorithm used to secure a Cisco device's password within a system configuration file. The use of weak password types enables password cracking attacks," the agency added today.

 

"Once access is gained a threat actor would be able to access system configuration files easily. Access to these configuration files and system passwords can enable malicious cyber actors to compromise victim networks. Organizations must ensure all passwords on network devices are stored using a sufficient level of protection."

 

CISA recommends using NIST-approved type 8 password protection for all Cisco devices. This ensures passwords are hashed with the Password-Based Key Derivation Function version 2 (PBKDF2), the SHA-256 hashing algorithm, an 80-bit salt, and 20,000 iterations.

 

More information on enabling Type 8 privilege EXEC mode passwords and creating a local user account with a Type 8 password on a Cisco device is available in NSA's Cisco Password Types: Best Practices guide.

 

The cybersecurity agency recommends following best practices for securing administrator accounts and passwords within configuration files.

 

This includes properly storing passwords using a strong hashing algorithm, avoiding password reuse across systems, using strong and complex passwords, and avoiding using group accounts that do not provide accountability.

Sponsored Ads:

Comments:


Microsoft-365-headpic-24-04-25.png

Microsoft blocks ActiveX by default in Microsoft 365, Office 2024

Category: Microsoft|Apr 24, 2025 | Author: Admin
logo.png

Microsoft Exchange 2016 and 2019 reach end of support in six months

Category: Microsoft|Apr 23, 2025 | Author: Admin
android-22-04-25.png

Google adds Android auto-reboot to block forensic data extractions

Category: Google|Apr 22, 2025 | Author: Admin
Outlook-21-04-25.png

Microsoft warns of CPU spikes when typing in classic Outlook

Category: Microsoft|Apr 21, 2025 | Author: Admin
hertz-sign-20-04-25.png

Hertz confirms customer info, drivers' licenses stolen in data breach

Category: General|Apr 20, 2025 | Author: Admin
hacker-19-04-25.png

Cybersecurity firm buying hacker forum accounts to spy on cybercriminals

Category: IT|Apr 19, 2025 | Author: Admin
padlock-18-04-25.png

SSL/TLS certificate lifespans reduced to 47 days by 2029

Category: IT|Apr 18, 2025 | Author: Admin
RAT-17-04-25.png

New ResolverRAT malware targets pharma and healthcare orgs worldwide

Category: IT|Apr 17, 2025 | Author: Admin
DaVita-sign-16-04-25.png

Kidney dialysis firm DaVita hit by weekend ransomware attack

Category: General|Apr 16, 2025 | Author: Admin
Exchange_headpic-15-04-25.png

Microsoft Exchange 2016 and 2019 reach end of support in six months

Category: Microsoft|Apr 15, 2025 | Author: Admin
Meta-14-04-25.png

Meta to resume AI training on content shared by Europeans

Category: IT|Apr 14, 2025 | Author: Admin
ChatGPT-headpic-13-04-25.png

Leak confirms OpenAI's GPT 4.1 is coming before GPT 5.0

Category: IT|Apr 13, 2025 | Author: Admin
microsoft-365-malicious-email-12-04-15.png

Tycoon2FA phishing kit targets Microsoft 365 with new tricks

Category: Microsoft|Apr 12, 2025 | Author: Admin
Google_flare-11-04-25.png

Google's AI video generator Veo 2 is rolling out on AI Studio

Category: Google|Apr 11, 2025 | Author: Admin
ChatGPT-10-04-25.png

OpenAI wants ChatGPT to know you over your life with new Memory update

Category: IT|Apr 10, 2025 | Author: Admin
more