Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2021-016
Version:
1.0
Affected software:
Cisco Enterprise NFV Infrastructure Software (NFVIS) if the TACACS external authentication feature is not configured.
Type:
Authentication bypass (Administrator privileges)
CVE/CVSS:
CVE-2021-34746 CVSS: 9.8
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-g2DMVVh
Cisco reports that a proof-of-concept(PoC) exploit code is available.
There are no reportings of active exploitation, however, the availability of working PoC exploit code is an indicator that threat actors could leverage this vulnerability soon.
The Centre for Cyber security Belgium (CCB), urges system administrators to patch vulnerable Cisco Enterprise NFV Infrastructure Software (NFVIS) to version 4.6.1 and later if TACACS external authentication feature is configured.
NFVIS deployments are impacted by this vulnerability only if TACACS external authentication method is configured on a targeted device, which can be determined by running the "show running-config tacacs-server" command in the CLI (Command Line Interface) or via the Graphical User Interface (GUI). NFVIS deployments that are using RADIUS or local authentication as the authentication method are not affected.
Cisco Issues Patch for Critical Enterprise NFVIS Flaw — PoC Exploit Available (thehackernews.com)