Cisco Fixes Hole in Industrial Routers

Thursday, March 23, 2017 @ 04:03 PM gHale


Some of Cisco’s industrial routers have a critical remote code execution vulnerability in the IOx application environment.

The flaw, which has a CVE-2017-3853 case number, affects the Data-in-Motion (DMo) process of IOx and is the result of a lack of proper bounds checking.

RELATED STORIES
Cisco Finds CMP Vulnerability
Cisco Suffers from Apache Struts2 Hole
Cisco Fixes NGA DoS Issue
Cisco WebEx Vulnerability Fixed, Again

That means a remote, unauthenticated attacker can exploit the vulnerability to trigger a stack overflow by sending specially crafted packets forwarded to the DMo process for evaluation.

Successful exploitation of the security hole can allow the attacker to execute arbitrary code with root privileges in the virtual instance running on the vulnerable device.

Cisco did say, however, the router itself is not the problem.

The vulnerability affects Cisco IR809 and IR829 industrial integrated services routers running IOx versions 1.0.0.0 and 1.1.0.0. Users can determine what version is running on their devices through the IOx Local Manager interface.

Cisco patched the flaw with the release of IOx 1.2.4.2.

In its advisory, Cisco said it is not aware of any attacks exploiting this vulnerability.

Cisco said it found the vulnerability during internal testing.



Leave a Reply

You must be logged in to post a comment.