Numerous Australian Cisco Devices Remain Infected with BADCANDY Malware
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Fast Overview
- More than 150 Cisco devices in Australia continue to be infected with BADCANDY malware.
- Fixes for the flaw have been accessible for over two years.
- Re-infection remains a threat as malicious actors are actively taking advantage of the vulnerability.
- BADCANDY enables attackers to entirely compromise devices and capture network traffic.
- The ASD has marked China’s Salt Typhoon group as one of the malicious actors.
- The vulnerability, CVE-2023-20198, has a top severity rating of 10.0.
- Restarting devices eliminates BADCANDY but does not address the flaw.
- It is essential to implement patches and examine device settings for effective protection.
Overview of BADCANDY Malware
The BADCANDY webshell has consistently posed a threat to Cisco routers and switches within Australia. Despite patches having been available for over two years, as of late October 2025, over 150 devices remain compromised. The Australian Signals Directorate’s Cybersecurity Centre (ACSC-ASD) notes that re-infection is a major concern as malicious actors exploit the flaw.
Technical Insights and Exploitation
The BADCANDY malware exploits a flaw designated as CVE-2023-20198, which carries a maximum severity rating of 10.0. This enables attackers to establish admin accounts, run commands, and gain complete control over the affected devices. Emerged in October 2023, the malware’s ease of use appeals to both criminal and state-sponsored entities, including China’s Salt Typhoon group.
Preventive Strategies and Suggestions
The ACSC-ASD recommends that organizations implement necessary patches and examine device configurations for unusual admin accounts. Investigating the presence of unknown tunnel interfaces is also advised. While rebooting can eliminate the malware, it does not rectify the core vulnerability, requiring additional steps to secure devices.
Conclusion
The persistent existence of BADCANDY malware on Australian Cisco devices highlights the urgent need for alertness and proactive cybersecurity actions. Organizations must take swift measures to patch vulnerabilities and monitor their systems to reduce the risk of re-infection and potential data leaks.