<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>IOS — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/ios/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 24 Apr 2026 05:43:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/ios/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-07-cisco-multiple-vulns/</link><pubDate>Fri, 24 Apr 2026 05:43:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-cisco-multiple-vulns/</guid><description>Multiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.</description><content:encoded><![CDATA[<p>A cluster of vulnerabilities affects Cisco ASA (Adaptive Security Appliance), Cisco Secure Firewall Threat Defense, Cisco IOS, Cisco IOS XE, and Cisco IOS XR. A remote attacker, either authenticated or anonymous, can exploit these vulnerabilities to bypass authentication mechanisms and execute arbitrary code with administrator privileges. The broad scope of affected products, ranging from security appliances to core networking infrastructure, makes this a critical issue for organizations relying on Cisco technology. Successful exploitation could lead to widespread network compromise and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Cisco device (ASA, Firewall Threat Defense, IOS, IOS XE, or IOS XR).</li>
<li>Attacker exploits a vulnerability allowing authentication bypass.</li>
<li>Upon successful authentication bypass, the attacker gains unauthorized access to the device.</li>
<li>Attacker leverages another vulnerability on the compromised system to inject and execute arbitrary code.</li>
<li>The code executes with administrator privileges, granting the attacker full control over the device.</li>
<li>Attacker uses the compromised device as a pivot point to move laterally within the network.</li>
<li>Attacker compromises additional systems and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to complete compromise of affected Cisco devices, allowing attackers to gain full administrative control. This can result in significant data breaches, service disruptions, and the potential for lateral movement within the network to compromise other critical systems. The broad range of affected Cisco products means a wide array of organizations are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules to your SIEM and tune for your environment to detect exploitation attempts.</li>
<li>Consult Cisco&rsquo;s security advisories for specific vulnerability details and apply the appropriate patches or mitigations as soon as they become available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cisco</category><category>vulnerability</category><category>rce</category><category>authentication-bypass</category></item><item><title>Cisco 802.1X (dot1x) Disabled on Network Interface</title><link>https://feed.craftedsignal.io/briefs/2024-01-cisco-dot1x-disabled/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cisco-dot1x-disabled/</guid><description>Detection of manual disablement of IEEE 802.1X (dot1x) on a Cisco network device interface, potentially allowing unauthorized network access and lateral movement.</description><content:encoded><![CDATA[<p>The disabling of 802.1X authentication on a Cisco network device can bypass Network Access Control (NAC) mechanisms, potentially granting unauthorized devices access to the internal network. Attackers or malicious insiders might disable dot1x to establish persistence or facilitate lateral movement by connecting rogue devices to the network. This can be accomplished through CLI commands such as &lsquo;access-session port-control force-authorized&rsquo; or &rsquo;no dot1x system-auth-control&rsquo;, depending on the IOS version. These commands either disable 802.1X on a specific interface or globally across the device. The targeted scope is Cisco network devices utilizing 802.1X for network access control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains privileged access to a Cisco network device via compromised credentials or exploiting a vulnerability.</li>
<li>Attacker executes CLI commands to disable 802.1X authentication on a specific interface or globally.</li>
<li>Commands used may include &lsquo;access-session port-control force-authorized&rsquo;, &lsquo;authentication port-control force-authorized&rsquo;, &lsquo;dot1x port-control force-authorized&rsquo;, &rsquo;no access-session port-control&rsquo;, &rsquo;no authentication port-control&rsquo;, &rsquo;no dot1x port-control&rsquo;, or &rsquo;no dot1x system-auth-control&rsquo;.</li>
<li>The network interface transitions to a force-authorized state, bypassing the normal authentication process.</li>
<li>An unauthorized device is connected to the compromised network interface.</li>
<li>The unauthorized device gains network access without proper authentication or authorization.</li>
<li>The attacker leverages the unauthorized access for lateral movement to other systems on the network.</li>
<li>The attacker exfiltrates sensitive data or deploys malicious payloads across the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of dot1x can lead to unauthorized network access, allowing attackers to bypass security controls. This can result in the compromise of sensitive data, the spread of malware, and the disruption of network services. The number of affected devices and the scope of the compromise depend on the network architecture and the attacker&rsquo;s objectives. The impact could range from a single compromised workstation to a full-scale network breach affecting thousands of devices and users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Cisco Dot1x Disabled</code> to your SIEM to detect the execution of commands that disable 802.1X authentication.</li>
<li>Monitor Cisco AAA logs for events containing keywords such as &lsquo;access-session port-control force-authorized&rsquo; and &rsquo;no dot1x system-auth-control&rsquo; to identify potential attempts to disable dot1x.</li>
<li>Implement multi-factor authentication (MFA) for all administrative access to Cisco network devices to prevent unauthorized command execution.</li>
<li>Regularly review and audit the configuration of Cisco network devices to ensure that 802.1X is enabled and properly configured on all relevant interfaces.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.defense-evasion</category><category>attack.persistence</category><category>attack.credential-access</category><category>attack.t1562.001</category><category>attack.t1556.004</category></item></channel></rss>