<div dir="ltr"><a href="http://www.pcworld.com/article/3122871/more-than-840000-cisco-devices-are-vulnerable-to-nsa-related-exploit.html">http://www.pcworld.com/article/3122871/more-than-840000-cisco-devices-are-vulnerable-to-nsa-related-exploit.html</a><br><span><section class="gmail-page">
<p>More than 840,000 Cisco networking devices from around the world are
exposed to a vulnerability that's similar to one exploited by a hacking
group believed to be linked to the U.S. National Security Agency.</p>
<p>The vulnerability was announced by Cisco last week and it affects the
IOS, IOS XE, and IOS XR software that powers many of its networking
devices. The flaw allows hackers to remotely extract the contents of a
device's memory, which can lead to the exposure of sensitive
information.</p>
<p>The vulnerability stems from how the OS processes IKEv1 (Internet Key
Exchange version 1) requests. This key exchange protocol is used for
VPNs (Virtual Private Networks) and other features that are popular in
enterprise environments.</p>
<p>Cisco discovered the vulnerability internally after analyzing an
exploit for Cisco PIX firewalls that was leaked last month by a hacking
outfit called Shadow Brokers. The exploit was part of a larger set of
attack tools that Shadow Brokers claimed are being used by a
cyberespionage group known in the security industry as the Equation,
believed to be linked to the NSA.</p>
<p>Because other hackers could find the same flaw by analyzing the
exploit leaked by Shadow Brokers, Cisco decided to inform its customers
about it through <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1">a security advisory</a>, even though the company is still working on developing and releasing patches.</p>
<p>Many of the affected IOS, IOS XE, and IOS XR releases don't yet have
fixed versions, but Cisco released detection signatures for intrusion
prevention systems that could be used to protect networks from potential
attacks.</p>
<p>The Shadowserver Foundation, an organization that tracks cybercrime
and assists with botnet takedowns, has started an internet-wide scan to
find Cisco devices affected by this vulnerability with the goal of
reporting them to their owners.</p>
<p>Its<a href="https://isakmpscan.shadowserver.org/"> latest scan</a>,
which ran for two and a half hours on Wednesday, identified devices with
840,681 distinct IP addresses that responded as vulnerable to the
probe.</p><aside id="gmail-" class="gmail-nativo-promo gmail-smartphone gmail-tablet gmail-desktop"> </aside>
<p>The U.S. is the country with the largest number of vulnerable devices
-- 255,606 -- followed by Russia with 42,281, and the United Kingdom
with 42,138. Canada, Germany, Japan, Mexico, France, Australia, and
China complete the top 10.</p>
</section></span><br></div>