From 57d257538f317981ca66b0efcc407b4272a3f04a Mon Sep 17 00:00:00 2001 From: Ralph Date: Wed, 18 Oct 2023 14:45:24 +0200 Subject: [PATCH] Update DIVD-2023-00038.md --- _cases/2023/DIVD-2023-00038.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/_cases/2023/DIVD-2023-00038.md b/_cases/2023/DIVD-2023-00038.md index c4348369..1d567da6 100644 --- a/_cases/2023/DIVD-2023-00038.md +++ b/_cases/2023/DIVD-2023-00038.md @@ -34,11 +34,11 @@ timeline: --- ## Summary -On October 16th, Cisco disclosed an authentication bypass vulnerability affecting Cisco IOS-XE appliances with CVE-ID CVE-2023-20198. An unknown threat actor is actively placing implants on the vulnerable appliances worldwide. This is a serious situation as implants allow threat actors to monitor traffic, gain access to the underlying system and pivot into protected networks. For additional guidance, please find the Cisco PSIRT advisory at the bottom of this page. +On October 16th, Cisco disclosed an authentication bypass vulnerability affecting Cisco IOS-XE appliances with CVE-ID CVE-2023-20198. An unknown threat actor is actively placing implants on the vulnerable appliances worldwide. This is a serious situation as implants allow threat actors to monitor traffic, gain access to the underlying system and move into protected networks. For additional guidance, please find the Cisco PSIRT advisory at the bottom of this page. ## Recommendations -Given that no patch is yet available, disable HTTP(S) access to any management interfaces if possible. If HTTP(S) access is required, implement an Access Control List to limit access. +No patch is currently available, therefore disable HTTP(S) access to any management interfaces if possible. If HTTP(S) access is required, implement an Access Control List to limit access. ## What we are doing