Cisco patches weaknesses in wireless, SD-WAN and IOS XE configuration software. Credit: JanBaby / Pixabay Cisco has patched three critical security holes in its IOS XE software that’s used across a variety of its core routers and switches. The three critical warnings are part of a big release of 32 security alerts, many of which are IOS XE-related, including firewall, SD-WAN and wireless access vulnerabilities. Of the critical patches, the worst is a weakness in the Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers; it’s rated as a 10 out of 10 on the Common Vulnerability Scoring System (CVSS). The vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code with administrative privileges or cause a denial of service (DoS) condition on an affected device. An attacker could exploit this vulnerability by sending a crafted CAPWAP packet to an affected device. CAPWAP is a networking protocol that lets users centrally manage wireless access points. A successful exploit could allow the attacker to execute arbitrary code with administrative privileges or cause the affected device to crash and reload, resulting in a DoS, Cisco stated. The second critical warning – with a 9.8 CVSS rating – impacts Cisco IOS XE SD-WAN Software and could let an attacker set off a buffer overflow on a the SD-WAN device, Cisco said. “This vulnerability is due to insufficient bounds checking when an affected device processes traffic,” Cisco stated. “An attacker could exploit this vulnerability by sending crafted traffic to the device. A successful exploit could allow the attacker to cause a buffer overflow and possibly execute arbitrary commands with root-level privileges, or cause the device to reload, which could result in a DOS condition.” The third critical warning also has a 9.8 CVSS rating and involves a weakness in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software that could let an attacker install, manipulate, or delete the configuration of an affected device and cause memory corruption that results in a DoS. The vulnerability lets an attacker bypass NETCONF or RESTCONF authentication. “A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS,” Cisco stated. Cisco said there is a workaround that addresses this vulnerability: Remove the enable password and configure an enable secret. There is also a mitigation that addresses this vulnerability: To limit the attack surface of this vulnerability, ensure that access control lists are in place for NETCONF and RESTCONF to prevent attempted access from untrusted subnets. Cisco has released free software updates that address the critical vulnerabilities. Related content news Cisco adds AI features to AppDynamics On-Premises A new virtual appliance for Cisco's AppDynamics observability platform will give enterprise customers more deployment options as well as AI-driven capabilities for anomaly detection and root cause analysis, application security, and SAP monitori By Michael Cooney May 10, 2024 4 mins Network Management Software Network Monitoring news CHIPS Act to fund $285 million for semiconductor digital twins Plans call for building an institute to develop digital twins for semiconductor manufacturing and share resources among chip developers. By Andy Patrizio May 10, 2024 3 mins CPUs and Processors Data Center news Microsoft’s AI ambitions fuel $3.3 billion bet on Wisconsin data center The Mount Pleasant site was initially earmarked for a manufacturing plant operated by electronics giant Foxconn. By Sascha Brodsky May 10, 2024 6 mins Data Center news analysis Red Hat unveils image mode for its Linux distro New container image deployment method for Red Hat Enterprise Linux is aimed at helping enterprises streamline operations and management. By Maria Korolov May 09, 2024 5 mins Linux Networking PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe