Cisco patches weaknesses in wireless, SD-WAN and IOS XE configuration software. Credit: JanBaby / Pixabay Cisco has patched three critical security holes in its IOS XE software that’s used across a variety of its core routers and switches. The three critical warnings are part of a big release of 32 security alerts, many of which are IOS XE-related, including firewall, SD-WAN and wireless access vulnerabilities. Of the critical patches, the worst is a weakness in the Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers; it’s rated as a 10 out of 10 on the Common Vulnerability Scoring System (CVSS). The vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code with administrative privileges or cause a denial of service (DoS) condition on an affected device. An attacker could exploit this vulnerability by sending a crafted CAPWAP packet to an affected device. CAPWAP is a networking protocol that lets users centrally manage wireless access points. A successful exploit could allow the attacker to execute arbitrary code with administrative privileges or cause the affected device to crash and reload, resulting in a DoS, Cisco stated. The second critical warning – with a 9.8 CVSS rating – impacts Cisco IOS XE SD-WAN Software and could let an attacker set off a buffer overflow on a the SD-WAN device, Cisco said. “This vulnerability is due to insufficient bounds checking when an affected device processes traffic,” Cisco stated. “An attacker could exploit this vulnerability by sending crafted traffic to the device. A successful exploit could allow the attacker to cause a buffer overflow and possibly execute arbitrary commands with root-level privileges, or cause the device to reload, which could result in a DOS condition.” The third critical warning also has a 9.8 CVSS rating and involves a weakness in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software that could let an attacker install, manipulate, or delete the configuration of an affected device and cause memory corruption that results in a DoS. The vulnerability lets an attacker bypass NETCONF or RESTCONF authentication. “A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS,” Cisco stated. Cisco said there is a workaround that addresses this vulnerability: Remove the enable password and configure an enable secret. There is also a mitigation that addresses this vulnerability: To limit the attack surface of this vulnerability, ensure that access control lists are in place for NETCONF and RESTCONF to prevent attempted access from untrusted subnets. Cisco has released free software updates that address the critical vulnerabilities. Related content news IBM, Palo Alto marry to focus on AI-based security technology The expanded partnership includes the sale of IBM’s QRadar security intelligence platform to Palo Alto Networks. By Michael Cooney May 15, 2024 4 mins Communications Security Network Security news ZutaCore launches liquid cooling for advanced Nvidia chips The HyperCool direct-to-chip system from ZutaCore is designed to cool up to 120kW of rack power without requiring a facilities modification. By Andy Patrizio May 15, 2024 3 mins Servers Data Center news 2024 global network outage report and internet health check ThousandEyes tracks internet and cloud traffic and provides Network World with weekly updates on the performance of ISPs, cloud service providers, and UCaaS providers. By Ann Bednarz May 15, 2024 45 mins Internet Service Providers Network Management Software Cloud Computing news Network jobs watch: Hiring, skills and certification trends What IT leaders need to know about expanding responsibilities, new titles and hot skills for network professionals and I&O teams. By Denise Dubie May 15, 2024 8 mins Careers Data Center Networking PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe