Cisco Systems Inc. during the weekend warned customers about the public release of computer code that exploits multiple security vulnerabilities in Cisco products.
Using exploits for nine software vulnerabilities, the program could allow malicious hackers to compromise Cisco’s popular Catalyst switches or a wide variety of machines running versions of the company’s Internetwork Operating System (IOS), Cisco said on Saturday.
Called the “Cisco Global Exploiter,” the program appears to give users a menu of choices, depending on the system they are trying to crack. For example, the “Cisco 677/678 Telnet Buffer Overflow Vulnerability,” or “Cisco Catalyst 3500 XL Remote Arbitrary Command Vulnerability,” according to the Web site, www.k-otik.com.
While many of the exploits can only be used to shut down affected Cisco devices in “denial of service” attacks, at least one enables remote attackers to run malicious code on the affected system without needing to supply a user name or password, according to the Cisco security notice.
Computer code for a program matching the description in the Cisco security notice was posted on a French language computer security exploit Web site on Sunday.
An Italian security research group calling itself “BlackAngels” took responsibility for the new tool, but disavowed any responsibility for “incorrect or illegal use of this software or for eventual damages to others systems,” according to the post on the K-Otik.com Web site and a statement on the group’s Web page, www.blackangels.it.
The group describes itself as a “group of Italian teenager boys, expert in the network security field and programming,” according to the BlackAngels Web site.
Members of the group did not immediately respond to requests for comment.
The San Jose networking equipment maker advised customers to patch software vulnerabilities exploited by the program to protect against malicious hackers using the new tool.