Vulnerabilities in software running on Cisco routers, switches

By
Follow google news

Cisco has reported two vulnerabilities affecting a feature designed to protect software being used in the networking giant's widely deployed switchers and routers.

Vulnerabilities in software running on Cisco routers, switches
According to a company advisory issued Tuesday, the IPS component of Cisco’s IOS (internetworking operating system), the more serious of the two flaws may allow malicious traffic to be delivered as IP packets to bypass signature detection.

"This could allow protected systems to be covertly attacked," the advisory said.

The other vulnerability could lead to a DoS condition and a system crash if certain network traffic uses the "regular expression feature of the ATOMIC.TCP signature engine."

Vulnerability tracking firm Secunia rated the two bugs "moderately critical" today.

In lieu of a patch, Cisco said there is a mitigation and workaround, respectively, for the two vulnerabilities.

The IPS detects for and attempts to block malicious traffic in real time. IOS software is largely used in Cisco routers and switches.

The vulnerable IOS versions are 12.3 and 12.4.

Cisco also reported today numerous vulnerabilities impacting its PIX (private internet exchange), ASA (adaptive security appliance), and FWSM (firewall services module) products.

Only one of the flaws could lead to the remote execution of code, the company said in another advisory.

Click here to email reporter Dan Kaplan.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Poor WA gov M365 security led to $71k theft and children's data breached

Poor WA gov M365 security led to $71k theft and children's data breached

Health and Aged Care CISO retires

Health and Aged Care CISO retires

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

AI data hunger feeding a shadowy proxy ecosystem

AI data hunger feeding a shadowy proxy ecosystem

Log In

  |  Forgot your password?