ºÚÁÏÉç

Security bulletin with an exclamation point in the middle of the screen
Security bulletin with an exclamation point in the middle of the screen

CVE-2023-20101: Critical Authentication Bypass Vulnerability in Cisco Emergency Responder

On October 4, 2023, Cisco published a security advisory disclosing a critical authentication bypass vulnerability (CVE-2023-20101, CVSS: 9.8) in Cisco Emergency Responder. Find Arctic Wolf’s recommendations.
Security bulletin with an exclamation point in the middle of the screen
6 min read

On October 4, 2023, Cisco published a disclosing a critical authentication bypass vulnerability (CVE-2023-20101, CVSS: 9.8) in Cisco Emergency Responder. CVE-2023-20101 allows an unauthenticated, remote threat actor to utilize the root account (this account by default has hard coded credentials that cannot be altered) to log into an affected device.?

?

Product? Vulnerability? Affected Release?
Cisco Emergency Responder? CVE-2023-20101?

12.5(1)SU4?

Note: Versions 11.5(1) and earlier, as well as version 14, are not affected.?

?

This vulnerability was discovered by Cisco during internal security testing. Since its disclosure, Arctic Wolf has not observed active exploitation of CVE-2023-20101 in the wild. Cisco products have become prime targets for threat actors due to the extensive access they can potentially gain within a compromised network. Arctic Wolf recently observed ransomware threat actors targeting Cisco Products; numerous other Cisco vulnerabilities have been exploited by threat actors and added to CISA¡¯s Known Exploited Vulnerabilities catalog.??

Recommendation CVE-2023-20101?

Upgrade Cisco Emergency Responder to Fixed Release??

Arctic Wolf strongly recommends upgrading Cisco Emergency Responder to the latest fixed release.??

Product? Affected Release? Fixed Release?
Cisco Emergency Responder? 12.5(1)SU4? 12.5(1)SU5?ciscocm.CSCwh34565_PRIVILEGED_ACCESS_DISABLE.k4.cop.sha512?

 

Please follow your organization’s patching and testing guidelines to avoid operational impact.??

References??

  1. Arctic Wolf Blog (Cisco Exploitation)
Share this post: