Menu
Cisco fixes denial-of-service flaws in IOS software for networking devices

Cisco fixes denial-of-service flaws in IOS software for networking devices

Seven vulnerabilities that could lead to device reboots and other performance issues were patched in various IOS components

Cisco Systems released security updates for its IOS software used on routers, switches and other networking gear in order to fix seven vulnerabilities that could be exploited by attackers to impact the performance of affected devices or force them to reboot.

The newly released IOS versions contain patches for two vulnerabilities identified in the software's Network Address Translation (NAT) feature that's commonly used in routing scenarios. One vulnerability could be exploited by sending malformed DNS packets to be processed and translated by an affected device and the other by sending certain sequences of TCP packets.

"To determine whether NAT has been enabled in the Cisco IOS Software configuration, log in to the device and issue the 'show ip nat statistics' command," Cisco said in a security advisory published Wednesday. "If NAT is active, the sections 'Outside interfaces' and 'Inside interfaces' will each include at least one interface."

The advisory contains a table listing affected IOS versions and the corresponding patched releases. The Cisco IOS XR and Cisco IOS XE software families are not affected by these two NAT vulnerabilities.

A separate vulnerability was identified and patched in the IP version 6 (IPv6) protocol stack implementation in Cisco IOS and Cisco IOS XE software. A remote, unauthenticated attacker could exploit this vulnerability by sending malformed IPv6 packets to trigger I/O (Input/output) memory depletion. This would cause the device to become unstable and require a reload, Cisco said in an advisory.

Cisco IOS and Cisco IOS XE updates were also released to fix a vulnerability in the software's Internet Key Exchange Version 2 (IKEv2) module. This vulnerability can be exploited to trigger a device reload by sending specifically crafted IKEv2 packets to it.

IKEv2 is used for a number of different features including several types of VPNs (Virtual Private Networks). However, "a device does not need to be configured with any IKEv2-specific features to be vulnerable," Cisco said in an advisory.

Another vulnerability was found and patched in the Secure Sockets Layer (SSL) VPN subsystem of the Cisco IOS software. The flaw allows an attacker to consume the memory of an affected device by submitting crafted HTTPS requests. This could impact the device's performance, could cause certain processes to fail or could lead to a device restart.

"To determine whether a device is enabled for WebVPN, the preferred method is to issue the 'show webvpn gateway' EXEC command," Cisco said in an advisory. "A device is affected if it is running the vulnerable software and the configuration lists the Admin and Operation statuses of any configured gateway as up."

The Cisco IOS XE and Cisco IOS XR software is not affected by this vulnerability and neither is the Cisco ASA 5500 Series Adaptive Security Appliance.

A sixth vulnerability was found in the Session Initiation Protocol (SIP) implementation in Cisco IOS and Cisco IOS XE. SIP is widely used for establishing multimedia communications like voice and video calls over the Internet.

The vulnerability only affects devices configured to process SIP messages and running Cisco IOS 15.3(3)M and 15.3(3)M1 or Cisco IOS XE 3.10.0S and 3.10.1S1, Cisco said in an advisory. The vulnerability was addressed in Cisco IOS 15.3(3)M2 and Cisco IOS XE 3.10.2S.

The last denial-of-service vulnerability patched Wednesday affects only IOS software running on the RSP720-3C-10GE and RSP720-3CXL-10GE models of the Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit Ethernet Uplinks.

The vulnerability is due to an issue with the device's onboard Kailash FPGA versions prior to 2.6, Cisco said in an advisory. "An attacker could exploit this vulnerability by sending crafted IP packets to or through the affected device. An exploit could allow the attacker to cause the route processor to no longer forward traffic or reboot."

The advisory contains a table with the IOS software versions that are vulnerable and the corresponding patched releases. The Cisco IOS XE and IOS XR software is not affected by this vulnerability.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags patchesnetworking hardwareCisco SystemsNetworkingsecuritypatch managementExploits / vulnerabilities

Featured

Slideshows

Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Consegna comes to town with AWS cloud offerings launch in Auckland

Consegna comes to town with AWS cloud offerings launch in Auckland

Emerging start-up Consegna has officially launched its cloud offerings in the New Zealand market, through a kick-off event held at Seafarers Building in Auckland.​ Founded in June 2016, the Auckland-based business is backed by AWS and supported by a global team of cloud specialists, leveraging global managed services partnerships with Rackspace locally.

Consegna comes to town with AWS cloud offerings launch in Auckland
Veritas honours top performing trans-Tasman partners

Veritas honours top performing trans-Tasman partners

Veritas honoured its top performing partners across the channel in Australia and New Zealand, recognising innovation and excellence on both sides of the Tasman. Revealed under the Vivid lights in Sydney, Intalock claimed the coveted Partner of the Year 2017 (Pacific) award, with Data#3 acknowledged for 12 months of strong growth across the market. Meanwhile, Datacom took home the New Zealand honours, with Global Storage and Insentra winning service provider and consulting awards respectively. Dicker Data was recognised as the standout distributor of the year, while Hitachi Data Systems claimed the alliance partner award. Photos by Bob Seary.

Veritas honours top performing trans-Tasman partners
Show Comments