ICS/OT

Cisco Patches Dozen Vulnerabilities in Industrial Routers

Cisco this week announced that it has patched tens of vulnerabilities in its IOS software, including a dozen security flaws that impact the company’s industrial routers and switches.

<p><strong><span><span>Cisco this week announced that it has patched tens of vulnerabilities in its IOS software, including a dozen security flaws that impact the company’s industrial routers and switches.</span></span></strong></p>

Cisco this week announced that it has patched tens of vulnerabilities in its IOS software, including a dozen security flaws that impact the company’s industrial routers and switches.

The networking giant on June 3 published its semiannual bundled publication of security advisories for IOS and IOS XE software. The advisories describe 25 vulnerabilities that have been rated critical or high severity. In addition, the company has published tens of other advisories for high- and medium-severity issues affecting IOS and other software.

A dozen vulnerabilities appear to impact the company’s industrial products. One of the security bugs rated critical is CVE-2020-3205, which allows an unauthenticated attacker with network access to execute arbitrary shell commands on the virtual device server of affected devices.

An attacker can exploit the vulnerability by sending specially crafted packets to the targeted device, and successful exploitation could lead to the system getting completely compromised.

The vulnerability tracked as CVE-2020-3198 has also been rated critical. It can allow a remote, unauthenticated attacker to execute arbitrary code on the system or cause it to crash and reload by sending it malicious packets.

Both these critical weaknesses impact Cisco 809 and 829 industrial integrated services routers (ISR) and 1000 series connected grid routers (CGR).

The high-severity flaws affecting industrial networking devices can be exploited to escalate privileges using hardcoded credentials, cause a DoS condition by sending specially crafted CIP (Common Industrial Protocol) traffic, execute arbitrary shell commands, and boot malicious software images. However, for these vulnerabilities exploitation requires authentication, local access, or a feature that is disabled by default to be enabled.

Some of the high-severity vulnerabilities affecting industrial products are related to the IOx application environment. They allow attackers to write or modify arbitrary files, launch DoS attacks, or execute arbitrary code with elevated privileges.

Learn more about vulnerabilities in industrial systems at SecurityWeek’s 2020 ICS Cyber Security Conference and SecurityWeek’s Security Summits virtual event series

Advertisement. Scroll to continue reading.

The medium-severity vulnerabilities affecting Cisco’s industrial products can be exploited by authenticated attackers for cross-site scripting (XSS) attacks and to overwrite arbitrary files.

The list of industrial Cisco products impacted by these vulnerabilities include 800, 809 and 829 series industrial ISRs, 1000 series CGR, the IC3000 Industrial Compute Gateway, Industrial Ethernet (IE) 4000 series switches, Catalyst IE3400 rugged series switches, and IR510 WPAN routers. Most of the vulnerabilities only impact 809 and 829 series industrial ISRs and 1000 series CGR devices.

The vendor also informed customers that its IOx application hosting infrastructure for IOS XE software is affected by a critical vulnerability that can be exploited by a remote, unauthenticated attacker to execute IOx API commands.

Cisco says it has found no evidence that these vulnerabilities have been exploited in attacks.

Related: IP-in-IP Vulnerability Affects Devices From Cisco and Others

Related: Cisco Servers Hacked via Salt Vulnerabilities

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version