Transcript
A (0:00)
50,000 Cisco firewalls remain exposed as advanced attackers exploit new flaws, CISA warns A critical pseudo flaw lets attackers gain root on Linux Western Digital My cloud devices are hit by a critical remote command flaw and real time AI voice cloning takes vishing to the next level. This is Cybersecurity today. I'm your host Jim Love. Nearly 50,000 Cisco firewalls remain exposed to the Internet through two serious vulnerabilities, CVE2025 2333 with a CVSS score of 9.9 and CVE2025 2362 with a CVSS score of 6.5, affecting the Cisco ASA and Firepower Threat Defense devices. Shadow server scanning shows the bulk of vulnerable systems are in the United States, and national security agencies from the U.S. canada, France, Netherlands and the UK have issued urgent warnings. The U.S. cybersecurity and Infrastructure Security Agency ordered federal agencies to patch within 24 hours. Attackers appear to be reusing tactics used in last year's Artain Door campaign, deploying a bootkit called Ray Initiator for persistence and a loader dubbed Line Viper for follow on Activity. Many at risk devices are older 5500x series firewalls that are at or near end of life, and agencies are blunt if you can't patch, replace the U.S. cybersecurity and Infrastructure Security Agency has added a critical pseudo vulnerability to its known exploited vulnerabilities list, tracked as CVE 2020532463 with a CVSS score of 9.3. It affects sudo versions before 1.9.17 P1 and allows a local attacker to abuse the Schrute handling to execute arbitrary commands as root even if they're not authorized in Sudoerse. Researchers disclosed the bug earlier this year and it is now being actively exploited. CISA has given Federal Agenc an urgent mitigation window. Everyone running Linux or Unix servers with older sudo must update to 1.9.17 P1 or later immediately. Western Digital patched a critical remote command injection vulnerability in many my cloud models, CVE 2020530247 with a CVSS score of 9.8, which can be triggered via the device web interface with a crafted HTTP post. Firmware 5.31.108, released September 23, fixes the issue for supported models including PR2100, PR4100, EX4100, EX2, Ultra Mirror, Gen2, and others. Crucially, some models such as the DL2100 and the DL4100 are are end of support and will not receive patches. These NAS devices often run unattended for years. When they reach the end of support, they become long running liabilities that attackers can reliably target for data theft, ransomware or botnet recruitment. So if you run my cloud hardware, take a look, update it now or take it off the network until you can replace it. Researchers have demonstrated real time AI voice cloning that produces a live, responsive cloned voice during a phone call, turning vishy from a pre recorded impersonation into a real time social engineering risk. The team that developed this kept their framework private to avoid abuse, but they warned that if criminal groups don't already have this capability, they almost certainly will soon. With only minutes of audio and a few hours of training, attackers can create calls that sound convincing enough to trick accountants, receptionists, or perhaps even family members. If your organization relies on phone authorizations for payments or any other type of access, put stricter controls in place today. Require written confirmations, dual approvals, or pre agreed secret words. And for families, agree on a verification phrase with relatives and elders. Never send money or share credentials because of an unexpected call. If you don't already have these protections in accounting or high risk roles, why not walk down there today and set them up? There's never been a piece of technology this powerful that wasn't weaponized. So let's take this as a given and let's take this as a bit of a fair warning and get on it today. That's our show for today. You can reach me with tips, comments and even some constructive criticism at the Tech Newsday contact page. You can find that@technewsday.com or cat I'm your host Jim Love. Thanks for listening.
