CISA Tags Windows and Cisco Vulnerabilities as Actively Exploited

CISA warns that critical vulnerabilities in Cisco and Windows systems are actively exploited, urging federal agencies to secure networks by March 23, 2025.
CISA Tags Windows and Cisco Vulnerabilities as Actively Exploited
Table of Contents
    Add a header to begin generating the table of contents

    The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning to U.S. federal agencies regarding vulnerabilities in Cisco and Windows systems. These vulnerabilities have been tagged as actively exploited, raising alarms about potential cyberattacks.

    Details of the Cisco Vulnerabilities

    CISA’s advisory highlights two main vulnerabilities:

    1. CVE-2023-20118: This flaw allows attackers to execute arbitrary commands on various Cisco VPN routers, including RV016, RV042, and RV325. While exploiting this vulnerability requires valid administrative credentials, it can be achieved by chaining it with another vulnerability, CVE-2023-20025, which allows for an authentication bypass.
    2. CVE-2018-8639: A Win32k elevation of privilege flaw that local attackers can exploit. This vulnerability impacts Windows client systems (Windows 7 and later) and server platforms (Windows Server 2008 and up). Successful exploitation permits attackers to run arbitrary code in kernel mode, potentially allowing them to alter data or create rogue accounts.

    CISA confirmed that these vulnerabilities are being actively exploited, stating:

    “These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.”

    Urgent Action Required

    CISA has added both vulnerabilities to its Known Exploited Vulnerabilities catalog. This inclusion mandates that Federal Civilian Executive Branch (FCEB) agencies secure their networks within three weeks, by March 23, 2025. Cisco has acknowledged the existence of publicly available proof-of-concept exploit code for CVE-2023-20025, emphasizing the urgency of addressing these vulnerabilities.

    According to a security advisory from Microsoft issued in December 2018, the Win32k flaw impacts significant versions of Windows, making it critical for enterprises to take immediate action. For organizations looking to bolster their defenses, exploring top cyber threats facing enterprise businesses in 2025 can provide valuable insights. Additionally, enterprises should consider the importance of phishing prevention strategies as part of their overall security framework.

    Conclusion

    The identification of these vulnerabilities by CISA underscores the ongoing threats faced by organizations using Cisco and Windows systems. Federal agencies must act swiftly to patch these vulnerabilities and enhance their cybersecurity posture. Additionally, securing remote work environments is essential in mitigating these risks. Learn more about how to secure remote work environments and the importance of cybersecurity awareness training for all employees.


    Related Posts