Number: AV18-027
Date: 7 February 2018
Purpose
The purpose of this advisory is to bring attention to a recently published Cisco security advisory.
Assessment
Cisco has released a security advisory to address vulnerabilities found in multiple products.
Affected products:
- Cisco RV132W ADSL2+ Wireless-N VPN and RV134W VDSL2 Wireless-AC VPN Routers
- Cisco Virtualized Packet Core-Distributed Instance
- Cisco UCS Central
- Cisco Policy Suite RADIUS
- Cisco Unified Communications Manager
- Cisco Spark
- Cisco IOS XR Software
- Cisco IOS and IOS XE Software Diagnostic Shell
- Cisco Firepower System Software BitTorrent File Policy
- Cisco Email Security Appliance and Cisco Content Security Management Appliance Spam Quarantine
- Cisco Data Center Analytics Framework
- Cisco Unified Communications Manager
- Cisco Policy Suite
- Cisco Prime Network
- Cisco StarOS for Cisco ASR 5000 Series Aggregation Services Routers
- Cisco RV132W and RV134W Wireless VPN Routers
CVE References: CVE-2018-0125, CVE-2018-0117, CVE-2018-0113, CVE-2018-0116, CVE-2018-0198, CVE-2018-0135, CVE-2018-0119, CVE-2018-0127, CVE-2018-0132, CVE-2018-0123, CVE-2018-0138, CVE-2018-0140, CVE-2018-0129, CVE-2018-0128, CVE-2018-0120, CVE-2018-0134, CVE-2018-0137, CVE-2018-0122
Suggested Action
CCIRC recommends that system administrators test and deploy the vendor-released updates to affected applications accordingly.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-rv13x
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-vpcdi
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucsc
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cps
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucm1
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucm
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-spark
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-iosxr
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ios
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-fss
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-esacsm
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-dcaf1
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-dcaf
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cucm
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cps1
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cpn
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-asr
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-rv13x_2