Cisco Patches High Risk Holes

Monday, July 16, 2018 @ 04:07 PM gHale

Cisco patched vulnerabilities in its products, including high risk holes in StarOS and 6800, 7800, and 8800 Series IP Phones.

One high severity bug impacts the reassembly logic for fragmented IPv4 packets of Cisco StarOS running on virtual platforms.

RELATED STORIES
Cisco Dealing with Active Exploitation
Cisco Clears Multiple Vulnerabilities
Cisco Patches Multiple Vulnerabilities
Cisco Fixes WebEx Vulnerability

By leveraging the issue, which has a case number of CVE-2018-0369, an unauthenticated remote attacker could trigger a reload of the npusim process, causing denial of service (DoS).

An attacker could trigger the simultaneous reload of all four instances of the npusim process running per Service Function (SF) instance.

Cisco officials said the vulnerability resides in the improper handling of fragmented IPv4 packets containing options. Thus, an attacker could exploit the issue by sending a malicious IPv4 packet across an affected device.

“An exploit could allow the attacker to trigger a restart of the npusim process, which will result in all traffic queued toward this instance of the npusim process to be dropped while the process is restarting,” Cisco said in an advisory.

Impacted products include Cisco Virtualized Packet Core-Single Instance (VPC-SI), Cisco Virtualized Packet Core-Distributed Instance (VPC-DI), and Cisco Ultra Packet Core (UPC) running StarOS operating system releases prior to the fixed version.

A second high risk flaw affects the web-based UI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware and could be exploited by an authenticated, remote attacker for command injection. CVE-2018-0341 is the case number for the vulnerability.

In addition to these two holes, Cisco fixed six medium severity issues in Web Security Appliance (WSA), FireSIGHT System Software, Firepower System Software, and Digital Network Architecture (DNA).



Leave a Reply

You must be logged in to post a comment.