Salt Typhoon Strikes Again: Cisco Device Exploits Rattle Telecom Giants Worldwide

Salt Typhoon, the Chinese state-sponsored threat actor, is back in action, exploiting Cisco device vulnerabilities like they’re on a global scavenger hunt. Despite sanctions and disclosures, they’re targeting telecoms and universities worldwide, proving once again that some typhoons just don’t know when to quit.

Pro Dashboard

Hot Take:

Salt Typhoon is at it again, but instead of bringing rain, they’re drenching telecom providers with cybersecurity headaches. Cisco devices need a raincoat, because this storm isn’t letting up anytime soon!

Key Points:

  • Salt Typhoon exploits vulnerabilities in Cisco devices.
  • Targets include telecom providers and universities across multiple countries.
  • The APT group has links to China’s Ministry of State Security (MSS).
  • CVE-2023-20198 and CVE-2023-20273 are the vulnerabilities being exploited.
  • More than 12,000 Cisco devices are potentially vulnerable.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?