CISA and FBI urging developers to get rid of OS command injection bugs

CISA and FBI urging developers to get rid of OS command injection bugs

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a joint security alert urging software companies to review and eliminate OS command injection vulnerabilities in their products before shipping.

The call comes in response to recent cyberattacks that exploited multiple security flaws (CVE-2024-20399, CVE-2024-3400, and CVE-2024-21887), targeting network edge devices from Cisco, Palo Alto Networks, and Ivanti.

CVE-2024-20399 is an OS command injection issue that allows a local user to escalate privileges on the system and execute arbitrary commands as root on the underlying operating system of an affected device.

The flaw was exploited as zero-day in a campaign by the China-linked Velvet Ant espionage group targeting Cisco Nexus devices.

The advisory outlines the nature of OS command injection vulnerabilities, which occur when software does not adequately validate and sanitize user input in commands executed on the underlying operating system. The lack of proper validation allows threat actors to execute malicious commands, significantly endangering customers.

CISA has strongly recommended that developers adopt well-known mitigations to prevent these vulnerabilities during the design and development of software products.

Key recommendations include:

  • Ensure software uses functions that generate commands in safer ways by preserving the intended syntax of the command and its arguments,

  • Review their threat models,

  • Use modern component libraries,

  • Conduct code reviews and implement aggressive adversarial product testing to ensure the quality and security of their code throughout the development lifecycle.

“OS command injection vulnerabilities have long been preventable by clearly separating user input from the contents of a command. Despite this finding, OS command injection vulnerabilities—many of which result from CWE-78—are still a prevalent class of vulnerability,” the agency said.


Back to the list

Latest Posts

Cyber Security Week in Review: July 4, 2025

Cyber Security Week in Review: July 4, 2025

In brief: Google patches Chrome 0Day, the US is on the hunt for North Korean IT workers, and more.
4 July 2025
AI chatbots fall for phishing scams

AI chatbots fall for phishing scams

The models provided the correct URL only 66% of the time; nearly 30% of responses pointed users to dead or suspended domains.
3 July 2025
Chinese hackers exploited Ivanti flaws in attacks against French government

Chinese hackers exploited Ivanti flaws in attacks against French government

ANSSI believes that the Houken campaign is operated by ‘UNC5174’, an entity believed to act as an initial access broker for China’s Ministry of State Security.
2 July 2025