Cisco during the weekend warned customers about the public release of computer code that exploits multiple security vulnerabilities in Cisco products.Cisco during the weekend warned customers about the public release of computer code that exploits multiple security vulnerabilities in Cisco products.Using exploits for nine software vulnerabilities, the program could allow malicious hackers to compromise Cisco’s popular Catalyst switches or a wide variety of machines running versions of the company’s Internetwork Operating System (IOS), Cisco said on Saturday.Called the “Cisco Global Exploiter,” the program appears to give users a menu of choices, depending on the system they are trying to crack. For example, the “Cisco 677/678 Telnet Buffer Overflow Vulnerability,” or “Cisco Catalyst 3500 XL Remote Arbitrary Command Vulnerability,” according to the Web site, www.k-otik.com. While many of the exploits can only be used to shut down affected Cisco devices in denial-of-service attacks, at least one enables remote attackers to run malicious code on the affected system without needing to supply a user name or password, according to the Cisco security notice.Computer code for a program matching the description in the Cisco security notice was posted on a French language computer security exploit Web site on Sunday. An Italian security research group calling itself “BlackAngels” took responsibility for the new tool, but disavowed any responsibility for “incorrect or illegal use of this software or for eventual damages to others systems,” according to the post on the K-Otik.com Web site and a statement on the group’s Web page, www.blackangels.it.The group describes itself as a “group of Italian teenager boys, expert in the network security field and programming,” according to the BlackAngels Web site.Members of the group did not immediately respond to requests for comment.The San Jose networking equipment maker advised customers to patch software vulnerabilities exploited by the program to protect against malicious hackers using the new tool.Cisco has released software updates and published “workaround” instructions for remediating the vulnerabilities exploited by the program.One security expert called the appearance of a toolkit for launching the exploit “standard practice” in the malicious hacking community and part of an informal “product development cycle” for security exploits. After discovering a vulnerability and publishing basic code to prove a vulnerability can be exploited, hackers work to refine that code and eventually make it “point and click,” said Mark Rasch, senior vice president and chief security counsel at Solutionary of Omaha, Neb.“Tools like this come out constantly,” Rasch said.Still, the release of a toolkit raises the bar for companies affected by the software holes by putting weapons into the hands of less sophisticated hackers, he said.“There’s a whole bunch of people out there with no technical skills at all (and) no idea what to do. They’re just waiting for somebody to build a toolkit so they can use it to shut down a company or break in, even though they don’t understand how it works,” he said. Companies that use affected Cisco products should scan their networks to see if they are using vulnerable Cisco devices or running vulnerable services such as FTP or Telnet. Companies also need to make an inventory of the software products and versions they are running, even if the products are not vulnerable to one of the Cisco exploits, he said.“Knowing that you don’t have to do something is as important as knowing that you do have to,” Rasch said. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe