Skip to content

Cisco Publishes Known Exploitation Advisory - 20250224001

Overview

Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login credentials as part of a targeted campaign aimed at major U.S. telecommunications companies. No new Cisco vulnerabilities were discovered during this campaign. While there have been some reports that Salt Typhoon is abusing three other known Cisco vulnerabilities, Cisco have not identified any evidence to confirm these claims. The vulnerabilities in question are listed below. Note that each of these CVEs have security fixes available. Threat actors regularly use publicly available malicious tooling to exploit these vulnerabilities, making patching of these vulnerabilities imperative.

What is vulnerable?

Product(s) Affected Version(s) CVE CVSS Severity
Cisco IOS and IOS XE Software Smart Install - Cisco IOS or IOS XE Software and have the Smart Install client feature enabled - see Smart Install Configuration Guide - Supported Devices CVE-2018-0171 9.8 Critical
Cisco IOS XE Software Web UI Feature - 17.9
- 17.6
- 17.3
- 16.12 (Catalyst 3650 and 3850 only)
CVE-2023-20198
CVE-2023-20273
10.0
7.2
Critical
High
Cisco NX-OS Software CLI - Nexus 3000 Series Switches
- Nexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later
- Nexus 9000 Series Switches in standalone NX-OS mode
CVE-2024-20399 6.7 Medium

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours... (refer Patch Management):

Additional References