Exposures and data breaches due to misconfigurations have become an “alarmingly common” trend according to StackRox’s latest Kubernetes Security Report.
The vulnerability allows an attacker to activate the affected device's Telnet service over an open transmission control protocol port and gain unauthorized access.
Cisco patched zero-day vulnerabilities in millions of devices; the White House backed US 5G plan; and IBM CTO called open source vital to edge success.
If exploited, the bugs would allow an attacker to eavesdrop on voice and video calls and steal corporate data flowing through the network’s switches and routers.
In the past three weeks, Microsoft, Cisco, Oracle, and Citrix have announced a slew of vulnerabilities as the companies have scrambled to lock down their product lines.
Almost 40 vulnerabilities with a 9.8 severity rating can be exploited over a network without requiring user credentials. So can dozens of others with lesser severity ratings.
“For the U.S. government to share its discovery of a critical vulnerability with a vendor is exceptionally rare if not unprecedented,” said Amit Yoran, CEO of Tenable.
Over the weekend two groups released proof-of-concept (PoC) exploit codes for this vulnerability on Github. Citrix said it will issue a fix later this month.
The legacy network and endpoint security vendor acquired key pieces of cloud-native technology used in its Cloud Optix security platform when it bought Avid Secure.