The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network. The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about two critical vulnerabilities in Optigo Networks’ ONS-S8 Spectra Aggregation Switch, a key component in critical infrastructure systems. According to CISA, these flaws could enable malicious actors to remotely bypass authentication and execute arbitrary code with low attack complexity, making them particularly dangerous for global critical infrastructure and manufacturing sectors. The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user. While no known exploitation of these vulnerabilities has been reported, the high-risk natue of the flaws and the potential impact on critical infrastructure systems enourage a sense of urgency in implementing these defensive measures. The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes. The second flaw is due to weak authentication enforcement, which could give attackers unauthorized access to the device’s management interface, manipulate system configurations, or access sensitive data. CISA advises implementing a layered defense strategy, including regular risk assessments and best practices for industrial control systems (ICS) security. Copyright © 2024 Information Security Buzz is brand owned by Bora Design SL a company registered in Spain with company number B42720136 whose registered office is in Alicante, Spain. These vulnerabilities, which affect all versions of the switch up to and including version 1.3.7, are a significant risk of remote code execution and authentication bypass. CISA recommends isolating the switch’s management traffic on a dedicated VLAN and securing connections to the management platform, OneView, using a dedicated network interface card (NIC). Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you. The technical storage or access that is used exclusively for anonymous statistical purposes.
This Cyber News was published on informationsecuritybuzz.com. Publication date: Thu, 03 Oct 2024 08:13:06 +0000