Home Security Cisco reveals third remote flaw in NSA group hack

Cisco reveals third remote flaw in NSA group hack

Networking company Cisco has revealed details of a third remotely exploitable bug in many of its current products. No fix has yet been released to fix this hole.

The vulnerability was revealed in a dump by a group known as Shadow Brokers in August.

This bug is due to a fault in Internet Key Exchange version 1 (IKEv1) packet processing code in Cisco's IOS, Cisco IOS XE, and Cisco IOS XR software.

It could allow a remote attack by an un authenticated person to retrieve the contents of memory and access confidential information.

Last month, Cisco revealed the existence of two remotely exploitable flaws in its products. At the time, it said that it had no previous knowledge of one of the vulnerabilities.

The group that released the details, Shadow Brokers, is suspected of having Russian backing. It obtained the details of the flaws by hacking into the Equation Group, an entity that has long been suspected of being an NSA front.

 

LEARN HOW TO BE A SUCCESSFUL MVNO

Did you know: 1 in 10 mobile services in Australia use an MVNO, as more consumers are turning away from the big 3 providers?

The Australian mobile landscape is changing, and you can take advantage of it.

Any business can grow its brand (and revenue) by adding mobile services to their product range.

From telcos to supermarkets, see who’s found success and learn how they did it in the free report ‘Rise of the MVNOs’.

This free report shows you how to become a successful MVNO:

· Track recent MVNO market trends
· See who’s found success with mobile
· Find out the secret to how they did it
· Learn how to launch your own MVNO service

DOWNLOAD NOW!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.