On October 4, 2023, Cisco published a security advisory disclosing a critical authentication bypass vulnerability (CVE-2023-20101, CVSS: 9.8) in Cisco Emergency Responder. CVE-2023-20101 allows an unauthenticated, remote threat actor to utilize the root account (this account by default has hard coded credentials that cannot be altered) to log into an affected device.
|Cisco Emergency Responder||CVE-2023-20101||
Note: Versions 11.5(1) and earlier, as well as version 14, are not affected.
This vulnerability was discovered by Cisco during internal security testing. Since its disclosure, Arctic Wolf has not observed active exploitation of CVE-2023-20101 in the wild. Cisco products have become prime targets for threat actors due to the extensive access they can potentially gain within a compromised network. Arctic Wolf recently observed ransomware threat actors targeting Cisco Products; numerous other Cisco vulnerabilities have been exploited by threat actors and added to CISA’s Known Exploited Vulnerabilities catalog.
Upgrade Cisco Emergency Responder to Fixed Release
Arctic Wolf strongly recommends upgrading Cisco Emergency Responder to the latest fixed release.
|Product||Affected Release||Fixed Release|
|Cisco Emergency Responder||12.5(1)SU4||12.5(1)SU5 ciscocm.CSCwh34565_PRIVILEGED_ACCESS_DISABLE.k4.cop.sha512|
Please follow your organization’s patching and testing guidelines to avoid operational impact.