Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Cisco Fixes Critical IOx Flaw Allowing Root Access to Guest OS
Cisco has released an update to mitigate a recent, severe security flaw in their IOx. Routers with the Guest OS installed as part of the IOx are vulnerable to remote privilege escalation. The flaw is caused by an improper access control weakness which allows a low-privileged user to authenticate to the Guest OS and gain root privileges. This flaw can also be solved by uninstalling the built-in Guest OS.
You must be logged in to reply to this topic.