• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 72000 (72k) monthly views (unique) and 272000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

Cisco Warns of Active AsyncOS Zero-Day Exploited by Hackers

johny899

Member
Content Writer
Messages
1,069
Reaction score
3
Points
43
Balance
$122.4USD
Do you ever worry about software that you frequently use being hacked? Cisco warned people about a high-risk vulnerability (zero-day) in AsyncOS that hackers are taking advantage of at this time. If you use Cisco Email Security Appliances (ESA) or Cloud Email Security (CES), this is critical for you.

What happened?​

Cisco found a major security flaw in AsyncOS. Hackers are able to gain remote access to the system without a password. This allows them to have full access to everything the system has to offer once they have found a way into it.

What you should know:
  • Hackers are currently attempting to take advantage of this vulnerability
  • The vulnerability exists in specific AsyncOS versions
  • Cisco has advised that customers should update their systems without delay.
I've worked with Cisco previously and the term "actively exploited" concerns me in the same way that if my door were open and unlocked I would be worried that someone might break in and steal my belongings when they had an opportunity to do so.

What Do You Need to Do​

If you own a Cisco ESA or CES:
  • Upgrade AsyncOS to the most recent version
  • Review logs for any abnormalities
  • Secure additional security measures such as multi-factor authentication
By performing these tasks right now, you can eliminate the risk of an outside entity accessing your CT.

Why Is This Important?​

Zero-day vulnerabilities represent a massive threat from a hacker as they may allow them to:
  • Send fraudulent emails (phishing)
  • Steal sensitive information
  • Gain access to your network, causing further damage, and getting further into your system.
 
Top