Go back

Identifying Vulnerabilities through No-Code Network Automation

NB author by NetBrain Nov 7, 2023

Identifying Vulnerabilities Through No-Code Network Automation

Network security is a critical exercise in continuous vigilance. Threats evolve, and new vulnerabilities are discovered every day. Case in point, on October 16th, 2023, Cisco revealed the existence of previously unknown vulnerabilities, CVE-2023-20198 and CVE-2023-20273 (Cisco Bug ID: CSCwh87343). This exploit affects Cisco’s IOS XE products by taking advantage of IOS XE’s web-UI functionality. It works regardless of whether the functionality is configured for HTTPS or not. Per the Cisco website:

These vulnerabilities allow a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system.

This bug received a Common Vulnerability Scoring System (CVSS) score of 10. This rating is reserved for the most severe vulnerabilities, which warrant immediate action to resolve.

NetBrain’s no-code Network Intents are the fastest way to respond to any real-world network problem. Every network engineer can apply this instant automation without programming or coding.

Our customer support engineers sprang into action within minutes of receiving the Cisco security advisory. They began plugging these security vulnerabilities using our no-code network automation. We knew time was of the essence and wanted to assist our customers in responding quickly within their own hybrid networks.

On that first day, we supplied materials to all our customers. NetBrain power users could use them to create Network Intents to identify CVE-affected IOS XE devices. This network-wide identification allowed their operators to repair each affected device.

Let’s discuss how NetBrain’s Next-Gen platform helped customers identify where they were vulnerable and open to attack.

Related