Exploitation Consequences
Exploiting these two vulnerabilities enables a threat actor to create an account with privilege level 15 access. This level of access grants the attacker complete control over the compromised device, providing the capability to install additional malware. The severity of this vulnerability prompted urgent action, with researchers from Talos strongly recommending affected entities to promptly follow the guidance outlined in Cisco’s PSIRT advisory.