Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
This report is about five major vulnerabilities affecting a multitude of Cisco products. The vulnerabilities have collectively been referred to as CDPwn. These flaws in the device architecture can affect large parts of the network infrastructure, but luckily, there are patches already available from the vendor.
CDPwn as the name may suggest affects CDP (Cisco Discovery Protocol) packets in Cisco network infrastructure. CDP is a protocol developed by Cisco to facilitate data-layer communications via announcement packets. The announcement packets utilize the MAC address through multicast frames sent to the switches and other devices. The protocol is turned on by default in every Cisco product out there.
Vulnerability List:
These vulnerabilities do require remote attackers to be on the local area network, but if they’re successfully exploited there’s a strong chance that further lateral movement and general chaos could occur. Remote attackers would have to enter the network using some other vulnerability to exploit on targets like edge nodes or end-users. From there depending on the Cisco device and the type of environment using specially crafted broadcast or multicast packets is an option for the attacker.
Impact of Cisco Vulnerabilities
Could result in the loss of control over critical pieces of network infrastructure leading to endless possibilities including lateral movement, denial of service, unauthorized changes, data transfers, packet capturing, and more. In particular, the lateral movement can occur through the successful exploitation of multiple CDP-enabled devices by sending announcement packets between switches. Attackers having full control over IP phones and cameras could result in undesired intelligence collection.
Recommendation for Protecting Against CDPwn
It’s highly encouraged that you use the Cisco links below in the supporting documentation section to implement the patches available as soon as possible. Please review the general network architecture conduct below:
Sources
IBM X-Force Exchange:
Supporting Documentation
Cisco Links:
Note: The Avertium Threat Report analyzes one current threat that has been shared by threat intelligence networks across the globe. Used internally by the Avertium CyberOps Team, this report outlines a “top-of-mind” threat and how it ought to be addressed accordingly.
This informed analysis is based on the latest data available.
Contact us for more information about Avertium’s managed detection and response service capabilities.