Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

OSINT - GreyNoise Observes Active Exploitation of Cisco Vulnerabilities Tied to Salt Typhoon Attacks

0
Medium
Published: Thu Mar 06 2025 (03/06/2025, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: type
Product: osint

Description

GreyNoise has observed active exploitation attempts targeting Cisco vulnerability CVE-2023-20198, linked to the Salt Typhoon (UNC3236/Volt Typhoon) threat actor group. Although no confirmed exploits in the wild have been reported, ongoing reconnaissance and medium severity indicate a credible threat, especially to European telecom organizations heavily reliant on Cisco infrastructure. The vulnerability could impact confidentiality and availability if exploited. Immediate patching, enhanced network monitoring, and access restrictions are critical mitigations. Countries with significant Cisco deployments in telecom, such as Germany, France, the UK, Italy, and the Netherlands, are most at risk. This threat highlights the importance of proactive threat intelligence and rapid response to vulnerabilities tied to state-affiliated actors.

AI-Powered Analysis

AILast updated: 10/28/2025, 19:19:29 UTC

Technical Analysis

The threat involves active exploitation attempts targeting Cisco products vulnerable to CVE-2023-20198, a medium severity vulnerability. This vulnerability is associated with Salt Typhoon, also known as UNC3236 or Volt Typhoon, a threat actor group believed to be state-affiliated and focused on strategic targets such as telecom infrastructure. GreyNoise intelligence indicates ongoing reconnaissance and exploitation attempts, although no confirmed successful exploits have been reported yet. The vulnerability affects Cisco devices widely deployed in telecom networks, which are critical for communications infrastructure. Exploitation could lead to unauthorized access, potentially compromising confidentiality and availability of network services. The threat actor’s interest in European telecoms is driven by the strategic importance of these networks. The technical details suggest a moderate threat level, with ease of exploitation sufficient to warrant immediate defensive actions. The absence of a CVSS score requires an assessment based on impact and exploitability, placing this threat at medium severity. The intelligence underscores the need for rapid patch deployment once available, continuous network monitoring for suspicious activity, and strict access control to vulnerable devices to prevent compromise.

Potential Impact

For European organizations, particularly telecom providers, the exploitation of CVE-2023-20198 could result in unauthorized access to critical network infrastructure, leading to potential data breaches, service disruptions, and degradation of network availability. Given the strategic role of telecom networks in national security and economic stability, successful exploitation could have cascading effects on communications, emergency services, and business operations. Confidentiality impacts include exposure of sensitive communications and network configurations, while availability impacts could disrupt essential services. The medium severity rating reflects a balance between the potential impact and the current lack of confirmed exploits, but the ongoing reconnaissance activity suggests a credible and evolving threat. European telecom operators relying heavily on Cisco infrastructure are particularly vulnerable, making them prime targets for state-affiliated threat actors seeking intelligence or disruption capabilities.

Mitigation Recommendations

Organizations should prioritize immediate patching of Cisco devices once updates addressing CVE-2023-20198 are released. Until patches are available, implement strict network segmentation to isolate vulnerable devices and restrict management access to trusted personnel and networks only. Enhance network monitoring with anomaly detection focused on reconnaissance and exploitation patterns associated with Salt Typhoon, leveraging threat intelligence feeds for early indicators. Employ multi-factor authentication and robust access controls on all Cisco infrastructure management interfaces. Conduct regular vulnerability assessments and penetration testing to identify and remediate exposure points. Collaborate with national cybersecurity agencies and industry groups to share intelligence and coordinate defensive measures. Additionally, maintain incident response readiness to quickly contain and remediate any detected compromise. Avoid exposing vulnerable devices directly to the internet and use VPNs or secure tunnels for remote access.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
2
Analysis
2
Uuid
18c55588-626c-4e78-8840-45f9014d195c
Original Timestamp
1741258691

Indicators of Compromise

Vulnerability

ValueDescriptionCopy
vulnerabilityCVE-2023-20198
CVE-2023-20198: enriched via the vulnerability_lookup module.
vulnerabilityCVE-2018-0171
CVE-2018-0171: enriched via the vulnerability_lookup module.
vulnerabilityCVE-2023-20273
CVE-2023-20273: enriched via the vulnerability_lookup module.
vulnerabilityCVE-2023-20198
vulnerabilityCVE-2018-0171
vulnerabilityCVE-2023-20273

Ip

ValueDescriptionCopy
ip139.59.223.9
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip5.36.204.121
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip109.107.214.226
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip209.38.74.178
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip167.71.109.17
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip142.93.167.249
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip157.230.153.118
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip164.92.179.58
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip134.209.5.135
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip128.199.176.205
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip64.44.206.10
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip95.42.20.67
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip165.22.47.115
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip159.223.86.187
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip142.93.168.28
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip207.154.201.214
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip157.245.156.7
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip139.59.254.193
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip64.227.93.39
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip159.65.33.216
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip143.110.199.6
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip64.225.47.166
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip51.255.62.13
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip51.255.62.15
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip104.131.186.130
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip165.22.251.103
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip165.227.125.35
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip128.199.238.30
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip167.71.52.166
tags:"Cisco IOS XE Privilege Escalation Attempt"
ip104.167.223.148
CVE-2018-0171 (IOS and IOS XE Smart Install Remote Code Execution)
ip179.43.168.146
CVE-2018-0171 (IOS and IOS XE Smart Install Remote Code Execution)
ip109.107.214.226
ip114.246.237.62
ip139.59.223.9
ip5.36.204.121

Datetime

ValueDescriptionCopy
datetime2023-10-16T15:12:58.735000+00:00
datetime2024-10-23T18:58:22.360000+00:00
datetime2018-03-28T22:00:00+00:00
datetime2024-11-13T18:24:11.004000+00:00
datetime2023-10-24T14:13:36.311000+00:00
datetime2024-10-23T18:57:38.005000+00:00

Text

ValueDescriptionCopy
textPUBLISHED
textPUBLISHED
textPUBLISHED

Link

ValueDescriptionCopy
linkhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z
linkhttps://ics-cert.us-cert.gov/advisories/ICSA-18-107-04
linkhttp://www.securitytracker.com/id/1040580
linkhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2
linkhttps://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
linkhttps://ics-cert.us-cert.gov/advisories/ICSA-18-107-05
linkhttp://www.securityfocus.com/bid/103538
linkhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z

Threat ID: 682c7dc0e8347ec82d2d85d2

Added to database: 5/20/2025, 1:04:00 PM

Last enriched: 10/28/2025, 7:19:29 PM

Last updated: 11/21/2025, 1:18:20 AM

Views: 383

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats