Cisco releases urgent patch for flaw that could let hackers access Emergency Response Systems
Cisco's ERS was carrying a rather worrying security flaw
Cisco Emergency Responder (CER), the company’s emergency communication system used to respond to crises in a timely manner, had hardcoded credentials, allowing hackers with knowledge of this fact easy access to the systems.
The news was confirmed by the company itself, which recently released a new patch to address the problem.
The vulnerability is tracked as CVE-2023-20101 and comes with a severity score of 9.8. "An attacker could exploit this vulnerability by using the account to log in to an affected system," Cisco said in an advisory. "A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user."
Hardcoded credentials
Hardcoded login credentials aren’t exactly a new thing. Developers sometimes use them to make logging in easier during development. The problem is when the devs forget to remove them before shipping the product out.
The flaw is found in Cisco Emergency Responder 12.5(1)SU4, and those who use it should make sure they bring the software up to version 12.5(1)SU5. Other releases were not vulnerable, it was said.
The good news is that Cisco is under the impression that no one managed to abuse the flaw yet. The company discovered it during internal security testing and has no reason to believe someone beat it to the punch.
However, now that the cat is out of the bag, it’s safe to assume that different threat actor groups will try and abuse the flaw. That is why keeping software up-to-date is one of the most important cybersecurity practices today. Most of cyberattacks and hacks these days are not done through zero-days (flaws for which the developers had zero days to fix), but rather old vulnerabilities that software users never got to patch.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Having endpoint protection solutions, as well as firewalls, installed, wouldn’t hurt, either.
More from TechRadar Pro
- Microsoft confirms Azure attacks using breached SQL servers
- Here's a list of the best firewalls today
- These are the best endpoint protection services around
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.