Cisco Confirms Switches Exploited by CIA via CMP Flaw; Fix Coming Soon

Advertisement
By Tasneem Akolawala | Updated: 5 April 2017 17:10 IST
Highlights
  • The company claims that the vulnerability is in CMP processing code
  • An exploit can be avoided by disabling telnet
  • Cisco promises a fix soon

Last week, WikiLeaks claimed that the CIA had exploited various apps, platforms, and devices unethically to spy on people. One of the affected tech companies was Cisco, whose switches were hacked by CIA to remotely exercise control. The company has now confirmed that as many as 318 Cisco switches have a vulnerability that can allow the CIA to remotely execute malicious code and gain full control on the device.

The company issued an advisory on the matter, and claimed that currently there are "no workaround that address this vulnerability," but it's looking to roll out a fix soon. Cisco discovered the vulnerability in the Vault 7 dump by WikiLeaks.

Advertisement

The advisory claims that the vulnerability is in the "Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software, and it could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges."

It essentially stems from a "failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device, and the incorrect processing of malformed CMP-specific Telnet options."

Advertisement

Cisco hasn't announced when the fix is coming, but has mentioned a few things for users to do to avoid hackers from taking advantage. It recommends disabling Telnet and using SSH, and has also detailed guidelines for doing it on this support page. Users who are unable or unwilling to disable the Telnet protocol can reduce the attack surface by implementing infrastructure access control lists (iACLs). Guidelines on that can be found on this support page.

WikiLeaks recently announced that it will work with technology companies to give them technical details to work on fixes of CIA exploits. Other tech giants affected by the CIA hacking are Apple, Microsoft, Samsung, and more.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Poco X8 Pro Max vs iQOO 15R vs Vivo V70 Elite
  2. Here's How Much the Vivo Y21 5G, Vivo Y11 5G Could Cost in India
  3. Top 7 Laser Printers for Students to Buy in India Right Now
  4. Samsung Galaxy S25 Ultra Reportedly Gets a Price Cut in India
  5. Prime Video Announces Farzi Season 2: All You Need to Know About This Show
  6. Samsung Galaxy M17e Goes on Sale in India: See Price, Offers
  7. Toaster OTT Release: When and Where to Watch Rajkummar Rao's Comedy Thriller
  1. Prime Video Announces Farzi Season 2: All You Need to Know About This Show
  2. Samathi Sakatham Now Available for Streaming Online: What You Need to Know
  3. The Taj Story Out on OTT: Know Where to Watch This Intense Courtroom Drama Online
  4. NASA Astronauts Complete 7-Hour Spacewalk to Prepare ISS Power System Upgrade
  5. Samsung Reportedly Plans to Introduce AirDrop Support on Galaxy S26 Series Later This Year
  6. Vivo Y21 5G, Vivo Y11 5G Price in India and Colourways Leaked a Month After Global Launch
  7. Toaster OTT Release: When and Where to Watch Rajkummar Rao’s Comedy Thriller
  8. FBI Warns Tron Blockchain Users of Phishing Attack Using Fake Tokens Impersonating the Agency
  9. Amazon Said to Be Working on New Smartphone Equipped With Alexa Assistant and AI Features
  10. Border 2 Now Streaming Online: Where to Watch Sunny Deol, Varun Dhawan Starrer Movie Online?
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.