Cisco Patches High-Severity Vulnerabilities in IOS Software

Cisco this week published its semiannual IOS and IOS XE software security advisory bundle, which addresses ten vulnerabilities, including six rated ‘high severity’.

The most important are three security bugs that can be exploited by remote, unauthenticated attackers to cause a denial-of-service (DoS) condition.

Tracked as CVE-2023-20080, the first of these flaws impacts the IPv6 DHCP version 6 (DHCPv6) relay and server features of IOS and IOS XE software. Insufficient validation of data boundaries allows an attacker to send crafted DHCPv6 messages to an affected device and cause it to reload unexpectedly.

The second vulnerability, CVE-2023-20072, impacts the fragmentation handling code of tunnel protocol packets and can be exploited by sending crafted fragmented packets to an affected system.

Cisco also addressed CVE-2023-20027, an issue in the implementation of the IPv4 Virtual Fragmentation Reassembly (VFR) feature of IOS and IOS XE software, which exists because large packets are not properly reassembled when VFR is enabled.

The vulnerability can be triggered by sending fragmented packets through a VFR-enabled interface on an affected device.

Another high-severity DoS flaw was resolved in the HTTP-based client profiling feature of IOS XE software for Wireless LAN controllers (WLCs). Tracked as CVE-2023-20067, the issue can be exploited by an adjacent attacker, without authentication.

“This vulnerability is due to insufficient input validation of received traffic. An attacker could exploit this vulnerability by sending crafted traffic through a wireless access point. A successful exploit could allow the attacker to cause CPU utilization to increase, which could result in a DoS condition on an affected device and could cause new wireless client associations to fail,” Cisco explains.

Cisco also addressed an insufficient input validation in the CLI of IOS XE SD-WAN software, which could allow an authenticated attacker to execute commands on the operating system with root-level privileges.

Tracked as CVE-2023-20035, the bug could allow an attacker with limited privileges to take over a vulnerable system.

The sixth high-severity flaw that Cisco addressed this week is CVE-2023-20065, an insufficient restrictions issue in the IOx application hosting subsystem of IOS XE software, which could allow an authenticated attacker to escalate their privileges to those of root.

Cisco’s semiannual IOS and IOS XE software updates also include patches for medium-severity DoS, path traversal, and privilege escalation vulnerabilities.

This week, Cisco also released patches for three other high-severity flaws, including a secure boot issue in Catalyst 9300 series switches, a privilege escalation bug in DNA Center, and a DoS vulnerability in access point (AP) software.

Several medium-severity issues were resolved in SD-WAN vManage software, DNA Center, Adaptive Security Appliance (ASA), Firepower Threat Defense (FTD), IOS and IOS XE software, and AP software.

Cisco says it is not aware of any of these flaws being exploited in malicious attacks. Additional information on the resolved vulnerabilities can be found on Cisco’s product security page.

Related: Vulnerability Exposes Cisco Enterprise Routers to Disruptive Attacks

Related: Cisco Patches Critical Vulnerability in IP Phones

Related: Cisco Patches High-Severity Vulnerabilities in ACI Components

https://www.securityweek.com/cisco-patches-high-severity-vulnerabilities-in-ios-software/