Cisco on Wednesday released patches for more than 30 security vulnerabilities in its products, including Critical flaws impacting NX-OS Software.
A total of five Critical arbitrary code execution vulnerabilities were addressed with this set of security patches, impacting the NX-API feature of NX-OS Software (CVE-2018-0301) and the Fabric Services component of FXOS Software and NX-OS Software (CVE-2018-0308, CVE-2018-0304, CVE-2018-0314, and CVE-2018-0312).
The bugs can be exploited by unauthenticated, remote attackers to cause a buffer overflow, execute arbitrary code (as root, in some cases), cause a denial of service (DoS) condition, or read sensitive memory content on an affected device.
The bugs impact multiple devices, including Nexus 3000 Series Switches to Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, Firepower 4100 and Firepower 9300 products, UCS 6100 to UCS 6300 Series Fabric Interconnects, and MDS 9000 Series Multilayer Switches.
Cisco also addressed High risk vulnerabilities impacting NX-OS Software and FXOS Software, affecting Nexus 4000 Series Switch, Nexus 3000 and 9000 Series, and Firepower 4100 Series and Firepower 9300 Security Appliance.
The issues affecting NX-OS include command-injections in the CLI and NX-API, denial of service (DoS) in the Simple Network Management Protocol (SNMP) input packet processor, elevation of privilege in role-based access control (RBAC), remote code execution and DoS in the Internet Group Management Protocol (IGMP) Snooping feature, DoS in the Border Gateway Protocol (BGP) implementation, elevation of privilege in NX-API.
Flaws also affecting FXOS Software include unauthorized administrator account in the write-erase feature, DoS conditions in the Discovery Protocol (formerly known as CDP) subsystem and Cisco Fabric Services component, and arbitrary code execution in the Cisco Discovery Protocol component.
Issues affecting only FXOS Software include an arbitrary code execution vulnerability in the CLI parser and a denial of service bug in the web UI.
Additionally, Cisco patched DoS flaws in the SNMP feature of the Cisco Nexus 4000 Series Switch and in the implementation of a specific CLI command and the associated SNMP MIB for Cisco Nexus 3000 and 9000 Series Switches.
A path traversal vulnerability was resolved in the process of uploading new application images to the Cisco Firepower 4100 Series Next-Generation Firewall (NGFW) and Firepower 9300 Security Appliance.
As part of this set of security updates, Cisco also addressed 10 Medium risk flaws in TelePresence Video Communication Server (VCS) Expressway, Unified Communications Manager IM & Presence Service (formerly CUPS), NX-OS Software, NVIDIA TX1 BootROM, Meeting Server, Firepower Management Center, 5000 Series Enterprise Network Compute System and Unified Computing (UCS) E-Series Servers, and AnyConnect Secure Mobility Client for Windows Desktop.
Software updates were released for the vulnerable products. Cisco customers with valid licenses are advised to upgrade to an appropriate release. Details on the resolved vulnerabilities and the affected products and devices are available on Cisco’s website.