Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Cisco fixes denial-of-service flaws in IOS software for networking devices

Lucian Constantin | March 28, 2014
Seven vulnerabilities that could lead to device reboots and other performance issues were patched in various IOS components

Cisco Systems released security updates for its IOS software used on routers, switches and other networking gear in order to fix seven vulnerabilities that could be exploited by attackers to impact the performance of affected devices or force them to reboot.

The newly released IOS versions contain patches for two vulnerabilities identified in the software's Network Address Translation (NAT) feature that's commonly used in routing scenarios. One vulnerability could be exploited by sending malformed DNS packets to be processed and translated by an affected device and the other by sending certain sequences of TCP packets.

"To determine whether NAT has been enabled in the Cisco IOS Software configuration, log in to the device and issue the 'show ip nat statistics' command," Cisco said in a security advisory published Wednesday. "If NAT is active, the sections 'Outside interfaces' and 'Inside interfaces' will each include at least one interface."

The advisory contains a table listing affected IOS versions and the corresponding patched releases. The Cisco IOS XR and Cisco IOS XE software families are not affected by these two NAT vulnerabilities.

A separate vulnerability was identified and patched in the IP version 6 (IPv6) protocol stack implementation in Cisco IOS and Cisco IOS XE software. A remote, unauthenticated attacker could exploit this vulnerability by sending malformed IPv6 packets to trigger I/O (Input/output) memory depletion. This would cause the device to become unstable and require a reload, Cisco said in an advisory.

Cisco IOS and Cisco IOS XE updates were also released to fix a vulnerability in the software's Internet Key Exchange Version 2 (IKEv2) module. This vulnerability can be exploited to trigger a device reload by sending specifically crafted IKEv2 packets to it.

IKEv2 is used for a number of different features including several types of VPNs (Virtual Private Networks). However, "a device does not need to be configured with any IKEv2-specific features to be vulnerable," Cisco said in an advisory.

Another vulnerability was found and patched in the Secure Sockets Layer (SSL) VPN subsystem of the Cisco IOS software. The flaw allows an attacker to consume the memory of an affected device by submitting crafted HTTPS requests. This could impact the device's performance, could cause certain processes to fail or could lead to a device restart.

"To determine whether a device is enabled for WebVPN, the preferred method is to issue the 'show webvpn gateway' EXEC command," Cisco said in an advisory. "A device is affected if it is running the vulnerable software and the configuration lists the Admin and Operation statuses of any configured gateway as up."

The Cisco IOS XE and Cisco IOS XR software is not affected by this vulnerability and neither is the Cisco ASA 5500 Series Adaptive Security Appliance.

 

1  2  Next Page 

Sign up for CIO Asia eNewsletters.