Cisco Warns of Command Injection Flaw in Cloud Platform

Cisco rolls out a bevy of patches tied to vulnerabilities found in its cloud services platform, IOS software and Prime Home products.

It’s already been a busy month of patching for Cisco Systems, and on Wednesday the networking giant rolled out nine more security updates addressing critical vulnerabilities across its core product lines.

Most notably, Cisco is warning of two security holes (one rated critical, the other high) found in its Cisco Cloud Services Platform 2100 (CCSP). One could allow an unauthenticated remote attacker to execute arbitrary code on a targeted system. The other is a command injection vulnerability found in the web-based GUI of the CCSP. This critical vulnerability could allow a remote attacker to gain root access privileges on CCSP’s underlying OS and execute arbitrary commands.

In both CCSP cases, Cisco has released software patches to fix the vulnerabilities.

Cisco also warned of a command injection vulnerability found in its Cisco IOS and IOS XE IOX operating systems. According to Cisco, the security hole is tied to an iox command and could allow an authenticated local attacker to perform command injection into the IOx Linux guest operating system. Cisco didn’t issue a patch, but is providing workaround instruction.

Another security alert was issued for the Cisco Data in Motion component in Cisco’s IOS and IOS XE software. The flaw created circumstances that could allow for an unauthenticated remote attacker to cause a partial denial of service (DoS) condition for the Data in Motion process on a targeted system. A software patch was issued for the bug.

Already this month, Cisco has been forced to release critical updates to a number of its core products. Last Friday, Cisco issued an alert for a second vulnerability in the Cisco IOS and IOS XE IOX operating systems similar to one exploited by the Equation Group, which is suspected to have ties to the U.S. National Security Agency. Last Thursday, Cisco warned customers of 12 vulnerabilities across its product line, including a critical vulnerability in the software that powers its conferencing product, WebEx Meetings Server.

As part of its security advisories announced Wednesday, Cisco included seven “medium” security updates. One included a vulnerability tied to the cryptographic implementation of multiple Cisco products that could allow an unauthenticated and remote attackers to make use of hard-coded certificate and keys embedded within the firmware of the affected device, according to Cisco. “An attacker could exploit this vulnerability by using the static information to conduct man-in-the-middle attacks to decrypt confidential information on user connections,” according to the Cisco alert.

Suggested articles

ThreatList: Latest DDoS Trends by the Numbers

Trends in DDoS attacks show a evolution beyond Mirai code and point to next-gen botnets that are better hidden and have a greater level of persistence on devices – making them “far more dangerous.”

bit and piece ddos attack

Bit-and-Piece DDoS Method Emerges to Torment ISPs

Perpetrators are using smaller, bit-and-piece methods to inject junk into legitimate traffic, causing attacks to bypass detection rather than sounding alarms with large, obvious attack spikes.

Discussion

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.