Latest Cisco Vulnerabilities

Author: Martin Voelk
April 8, 2015

Some of the latest Cisco vulnerabilities:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-dcnm

and

Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers (ASR), Cisco 4400 Series Integrated Services Routers (ISR), and Cisco Cloud Services Routers (CSR) 1000v Series contains the following vulnerabilities:

  • Cisco IOS XE Software Fragmented Packet Denial of Service Vulnerability
  • Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability
  • Cisco IOS XE Software Crafted IPv6 Packet Denial of Service Vulnerability
  • Cisco IOS XE Software Layer 4 Redirect Crafted Packet Denial of Service Vulnerability
  • Cisco IOS XE Software Common Flow Table Crafted Packet Denial of Service Vulnerability

These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others.

Successful exploitation of any of these vulnerabilities could allow an unauthenticated, remote attacker to trigger a reload of the forwarding plane, causing an interruption of services. Repeated exploitation could result in a sustained denial of service (DoS) condition.

Successful exploitation of Cisco IOS XE Software Crafted TCP Packet Remote Code Execution Vulnerability could allow an unauthenticated remote attacker to execute malicious code on the affected device.

Cisco has released free software updates that address these vulnerabilities. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe

Note: The March 25, 2015, Cisco IOS & XE Software Security Advisory bundled publication includes seven Cisco Security Advisories. The advisories address vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: Semiannual Cisco IOS & XE Software Security Advisory Bundled Publication at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar15.html

 

Share

Cisco OpenSSL Vulnerabilities

Author: Martin Voelk
March 22, 2015

Summary

Multiple Cisco products incorporate a version of the OpenSSL package affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or corrupt portions of OpenSSL process memory. On March 19, 2015, the OpenSSL Project released a security advisory detailing 13 distinct vulnerabilities. The following seven are actively under investigation and the vulnerabilities are referenced in this document as follows:

  • CVE-2015-0286: OpenSSL ASN1_TYPE_cmp Denial of Service Vulnerability
  • CVE-2015-0287: OpenSSL ASN.1 Structure Reuse Memory Corruption Vulnerability
  • CVE-2015-0289: OpenSSL PKCS7 NULL Pointer Dereference Denial of Service Vulnerability
  • CVE-2015-0292: OpenSSL Base64 Decoding Memory Corruption Vulnerability
  • CVE-2015-0293: OpenSSL SSLv2 CLIENT-MASTER-KEY Denial of Service Vulnerability
  • CVE-2015-0209: OpenSSL Elliptic Curve d2i_ECPrivateKey Denial of Service Vulnerability
  • CVE-2015-0288: OpenSSL X.509 to PKCS#10 Denial of Service Vulnerability

The following six vulnerabilities do not affect any Cisco products:

  • CVE-2015-0291: OpenSSL ClientHello sigalgs Denial of Service Vulnerability
  • CVE-2015-0290: OpenSSL Multiblock Denial of Service Vulnerability
  • CVE-2015-0207: OpenSSL DTLSv1_listen SSL Object Corruption Denial of Service Vulnerability
  • CVE-2015-0208: OpenSSL Invalid Probabilistic Signature Scheme Parameters Denial of Service Vulnerability
  • CVE-2015-1787: OpenSSL Empty ClientKeyExchange Denial of Service Vulnerability
  • CVE-2015-0285: OpenSSL Handshake with Unseeded PRNG Predictable Value Vulnerability

This advisory will be updated as additional information becomes available.

Cisco will release free software updates that address these vulnerabilities.

Workarounds that mitigate these vulnerabilities may be available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150320-openssl

Share