Cisco security updates

Number: AV17-144
Date: 27 September 2017

Purpose

The purpose of this advisory is to bring attention to multiple Cisco security advisories.

Assessment

Cisco released multiple security updates to address vulnerabilities in the following products.

-Cisco IOS XE Software Web UI REST API Authentication AuthenticationA process or measure used to verify a users identity. Bypass Vulnerability
-Cisco IOS XE Software Web UI Privilege Escalation Vulnerability
-Cisco IOS and IOS XE Software DHCP Remote Code Execution Vulnerability
-Cisco Mobility Express 1800 Access Point Series Authentication Bypass Vulnerability
-Cisco IOS Software for Cisco Catalyst 6800 Series Switches VPLS Denial of Service Vulnerability
-Cisco IOS Software for Cisco Integrated Services Routers Generation 2 Denial of Service Vulnerability
-Cisco IOS Software for Cisco Industrial Ethernet Switches PROFINET Denial of Service Vulnerability
-Cisco IOS and IOS XE Software Plug-and-Play PKI API Certificate Validation Vulnerability
-Cisco IOS XE Software for Cisco 5760 WLC, Cisco Catalyst 4500E Supervisor Engine 8-E, and Cisco NGWC 3850 GUI Privilege Escalation Vulnerability
-Cisco IOS Software Network Address Translation Denial of Service Vulnerability
-Cisco IOS XE Software Locator/ID Separation Protocol Authentication Bypass Vulnerability
-Cisco IOS XE Wireless Controller Manager Denial of Service Vulnerability
-Cisco IOS and IOS XE Software Internet Key Exchange Denial of Service Vulnerability
-Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerabilities
-Cisco IOS XE Software for Cisco ASR 1000 Series and cBR-8 Routers Line Card Console Access Vulnerability

CVE References: CVE-2017-3831, CVE-2017-12222, CVE-2017-12226, CVE-2017-12228, CVE-2017-12229, CVE-2017-12230, CVE-2017-12231, CVE-2017-12232, CVE-2017-12233, CVE-2017-12234, CVE-2017-12235, CVE-2017-12236, CVE-2017-12237, CVE-2017-12238, CVE-2017-12239, CVE-2017-12240

Suggested Action

CCIRC recommends that system administrators test and deploy the vendor-released updates to affected applications accordingly.

References:

Date modified: