High-profile attacks relentlessly targeting critical infrastructure and network providers demand a new standard of defense. Building on our core principles of secure-by-default and secure-by-design, we’re committed to driving resilient infrastructure through proactive hardening and anticipating tomorrow's threats.
We will be delivering critical security enhancements across Cisco products, some of which may require our customers to take action. We're committed to making this transition as seamless and non-disruptive as possible and will continue to update this page for the latest guidance and resources. Here’s what else you need to know.
A core tenet of resilient infrastructure is disabling unused features by default (and requiring customers to explicitly enable features they desire), thereby reducing attack surfaces. Hardening guides provide detailed recommendations and best practices needed to implement these changes effectively. Our guides also include details on best practices for enabling key security features (to the extent they are not yet, or cannot fully be, enabled by default) that further help protect sensitive data and make devices more resilient to attacks.
These are actions that can and should be taken by customers today, protecting your network and preparing the network for changes being delivered as part of this effort.
Cisco strongly recommends running our latest software releases, as they offer the most robust security. It is critical to avoid running products approaching or past their End of Vulnerability Support (EoVSS). After this milestone, no new security fixes are issued, leaving your systems potentially exposed to significant, unmitigated risks. Cisco’s Last Day of Support (LDOS) marks the final date for any support or updates. Proactive patching and diligent management of your product lifecycles against these critical dates are essential for a protected and reliable environment.
Cisco provides transparent vulnerability disclosures following a well-defined policy. We urge customers to subscribe to security advisory notifications and apply patches promptly. Beyond advisories, proactively staying current on recommended releases is key to strengthening your security posture.
To reduce your attack surface and protect sensitive data, insecure features and protocols will be systematically deprecated and eventually removed from identified Cisco products. Our phased removal strategy is planned to span three feature releases to minimize disruption:
We’re enforcing more secure-by-default settings to significantly reduce your attack surface and improve security posture. This includes disabling services like web servers, SNMP, and guest shell by default.
Understanding what’s changing and your role:
This page will be updated as these changes are released across the product portfolio, giving you time to prepare for these developments.
To help customers detect and respond to threat actors, this effort significantly augments logging and monitoring capabilities across various products, generating richer telemetry for enhanced threat detection, forensic analysis, and compliance auditing.
Key enhancements include:
Default Logging Changes: Adjustments to default settings and new messages for security-significant events (e.g., critical configuration modifications like AAA or logging settings).
Best Practice Warnings: New logs to alert you when security best practices are not followed (e.g., insecure RADIUS/TACACS+ or unauthenticated NTP).
Expanded Visibility: Increased insight into guest shell environments and low-level operating system events.
Secure Time Synchronization: Enhancements to secure NTP, including support for Network Time Security (NTS), for accurate timestamps critical to effective logging.
Authentication protocols like TACACS+ and RADIUS are increasingly targeted by threat actors. Legacy implementations, relying on MD5 and pre-shared keys, are vulnerable. To counter this, Cisco is significantly enhancing device authentication security:
Modernizing Authentication Protocols: We plan to add support for TACACS+ over TLS 1.3 across the Cisco portfolio and promote the use of TLS or DTLS (RadSec) for secure RADIUS traffic. These advancements combat weaknesses and enhance operational security.
Enhanced Device Access: New features will include support for FIDO2 over SSH and the ability to use SSH public key authentication with TACACS+ to provide a way to use SSH public keys at scale.