Vulnerabilities

Cisco Patches High-Severity Vulnerabilities in Networking Software

Cisco this week announced IOS and IOS XE software updates that address 12 vulnerabilities, including 10 high-severity security flaws.

<p><strong><span><span>Cisco this week announced IOS and IOS XE software updates that address 12 vulnerabilities, including 10 high-severity security flaws.</span></span></strong></p>

Cisco this week announced IOS and IOS XE software updates that address 12 vulnerabilities, including 10 high-severity security flaws.

The bugs were resolved as part of Cisco’s semiannual bundle patches for its networking software, which it releases in March and September.

With a CVSS score of 8.6, the most severe of the newly addressed issues are six vulnerabilities that could lead to denial-of-service (DoS) conditions.

The issues exist because of improper processing or insufficient input validation of certain packages, improper management of resources, and logic errors.

An attacker could exploit these vulnerabilities by sending malformed CIP packets, crafted DNS packets, a malformed packet out of an affected MPLS-enabled interface, malicious UDP datagrams, crafted CAPWAP Mobility packets, or malicious DHCP messages.

According to Cisco, these vulnerabilities impact multiple product series, including Catalyst 9100 access points (APs), Catalyst 9800 wireless controllers, Catalyst 3650, Catalyst 3850, and Catalyst 9000 switches, ASR 1000 embedded services processors, and Catalyst 8500 edge platforms.

Of the remaining four high-severity vulnerabilities, two could allow an attacker to cause a DoS condition by sending crafted SSH requests or IPv6 packets.

While the first impacts the SSH implementation of IOS and IOS XE, the second affects the implementation of IPv6 VPN over MPLS (6VPE) when IOS XE has both 6VPE and Zone-Based Firewall (ZBFW) enabled.

Advertisement. Scroll to continue reading.

The two remaining issues could lead to arbitrary code execution at boot time, without authentication, or escalate privileges and execute commands on the underlying OS as root.

This week, Cisco also announced patches for several other high-severity security bugs, including two privilege escalation flaws in SD-WAN and two DoS issues in Wireless LAN Controller (WLC) AireOS software and Catalyst 9100 APs.

Cisco has released software updates that address these vulnerabilities. The tech giant says it is not aware of any of these vulnerabilities being exploited in attacks.

A total of eight medium-severity flaws impacting IOS and other Cisco products were also resolved. Additional information on the released patches can be found on the company’s security portal.

Related: L2 Network Security Control Bypass Flaws Impact Multiple Cisco Products

Related: Cisco Patches High-Severity Vulnerabilities in Business Switches

Related: Cisco Patches High-Severity Vulnerability in Security Solutions

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version