5 Vulnerabilities Found in Cisco’s Discovery Protocol (CDP)
Situation
5 vulnerabilities have been found in Cisco’s Discovery Protocol (CDP)
Problem
The 5 vulnerabilities found in CDP, four of which are remote code execution vulnerabilities and one as a denial of service, can allow complete remote takeover of the devices which can allow data, video and audio to be exfiltrated from the network along with allowing the attacker to change any configurations on the device.
Implication
Use of the CDPwn vulnerabilities leaves any data connected to the devices open to attack if they remain unpatched giving a remote attacker the possibility of complete control.
Need
As of February 5th Cisco has worked with Armis and created system patches for the affected hardware, Cisco recommends patching any devices that are vulnerable.If patching is not an option you may be able to turn off CDP to prevent these exploits but not all of the devices allow you to turn CDP off on.
Learn More
https://threatpost.com/critical-cisco-cdpwn-flaws-network-segmentation/152546/
Android Bluetooth Vulnerability
Situation
A vulnerability (CVE-2020-0022) has been found on the Android operating system versions 8.0 to 9.0 affecting the Bluetooth subsystem which could allow for a remote code execution without any user interaction. Android versions older than 8.0 might also be affected but have not been tested.
Problem
A attacker within Bluetooth proximity can be able to remotely execute arbitrary code with the privileges of the Bluetooth daemon as long as Bluetooth is enabled on the device. No user interaction is required and only the Bluetooth MAC address of the target devices has to be known. The risk of exploitation is that they could be used to implement a wormable behavior in malware that could spread from one device to another device that is in its proximity and reachable via Bluetooth.
Implication
Successful exploitation can allow an attacker to be able to view, change, or delete personal data. An attacker can also be able to install malware and run commands with the same permission as the Bluetooth daemon.
Need
Users are strongly advised to install the latest available security patch from February 2020. If you have no patch available yet or your device is not supported anymore, you can try to mitigate the impact by some generic behavior rules: Only enable Bluetooth if strictly necessary and if available put your device non-discoverable mode.
Learn More
https://insinuator.net/2020/02/critical-bluetooth-vulnerability-in-android-cve-2020-0022/