Cisco Updates
3217Warning Date
Severity Level
Warning Number
Target Sector
4 June, 2020
● High
2020-1318
All
Description:
Cisco has released security updates to address multiple vulnerabilities in the following products:
- Cisco Application Services Engine Software
- Prior to 1.1.2.20.
- Cisco ASR 920 Series Aggregation Services Router model ASR920-12SZ-IM
- if it is configured with both SNMP (either Version 2c or 3) and Cisco Discovery Protocol.
- Cisco Catalyst 2960-L Series Switches and Cisco Catalyst CDB-8P Switches
- that are running a vulnerable release of Cisco IOS Software with 802.1X port-based authentication
- Cisco IOx Application Framework
- release earlier than Release 1.9.0:
- 800 Series Industrial Integrated Services Routers (Industrial ISRs)
- 800 Series Integrated Services Routers (ISRs)
- 1000 Series Connected Grid Routers (CGR1000) Compute Module
- release earlier than Release 1.9.0:
- IC3000 Industrial Compute Gateway
- Industrial Ethernet (IE) 4000 Series Switches
- IOS XE-based devices:
- 1000 Series ISRs
- 4000 Series ISRs
- ASR 1000 Series Aggregation Services Routers
- Catalyst 9x00 Series Switches
- Catalyst IE3400 Rugged Series Switches
- Embedded Services 3300 Series Switches
- IR510 WPAN Industrial Routers
- Cisco DNA Center software
- releases earlier than Release 1.3.3.3.
- Cisco Catalyst 9800 Series Wireless Controllers
- if they were running a vulnerable release of Cisco IOS XE Software and processed device analytics from supported Apple devices
- Cisco IOS XE Software and processed device analytics
- supported Apple devices.
- Cisco 4300 Series Integrated Services Routers and Cisco Catalyst 9800-L Wireless Controllers
- running a vulnerable release of Cisco IOS XE Software and were configured for IPsec VPN.
- Cisco ISE software releases:
- Earlier than Release 2.2.0.470-Patch13
- Earlier than Release 2.3.0.298-Patch6
- Earlier than Release 2.4.0.357-Patch2
- Cisco Prime Infrastructure software
- releases earlier than Release 3.7.1 Update 01 and Release 3.8 Update 02.
- Cisco products:
- Cisco IOS Software
- Cisco IOS XR Software
- Cisco NX-OS Software
- Cisco devices
- that are running a vulnerable release of Cisco IOS XE Software.
- Cisco NX-OS Software with support for SXP version 4 (SXPv4):
- Nexus 7000 Series Switches — Release 8.0(1) only
- Nexus 1000 Virtual Edge for VMware vSphere
- Nexus 1000V Switch for VMware vSphere
- Cisco devices
- running a vulnerable release of Cisco IOS or IOS XE Software.
- Cisco Unified CCX software
- releases earlier than Release 12.5(1).
- Cisco IOS XE Software
- Cisco IOS or IOS XE Software
- IKEv2 features configured.
- Cisco products if they are running a vulnerable release of Cisco IOS Software:
- Cisco 809 and 829 Industrial ISRs
- CGR1000
- Cisco IOS, IOS XE, or IOS XR Software
- onePK feature enabled.
- Cisco Catalyst 9800 Series Wireless Controllers
- running a vulnerable release of Cisco IOS XE Software and are configured with LSCs.
- Cisco Catalyst 9800 Series Wireless Controllers
- running a vulnerable release of Cisco IOS XE Software and have the Application Visibility and Control (AVC) feature enabled.
Threats:
Remote attacker could exploit these vulnerabilities by doing the following:
- Execute arbitrary code remotely
- Authentication bypass
- Execute arbitrary code as a root
- Send and receive broadcast traffic before authentication
- Overwrite files
- Use those credentials to discover and manage network devices
- Man-in-the-middle attack.
- Cross-site scripting (XSS)
- SQL injection
- Privilege Escalation remotely
- Command Injection
Best practice and Recommendations:
The CERT team encourages users to review Cisco security advisory and apply the necessary updates:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-EPU-F8y5kUOP
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-KSV-3wzbHYT4
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr920-ABjcLmef
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960L-DpWA9Re4
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-caf-file-mVnPqKW9
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-caf-file-mVnPqKW9
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-audit-log-59RBdwb6
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-dos-AnvKvMxR
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-vpn-dos-edOmW28Z
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxxss-wc6CqUws
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-dos-qNzq39K7
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-sql-inj-KGLLsFw8
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-priv-esc1-OKMKFRhV
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-priv-esc2-A6jVRu7C
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-priv-esc3-GMgnGCHx
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxp-68TEVzR
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tcl-ace-C9KuVKmm
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tcl-dos-MAZQUnMF
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-api-auth-WSx4v7sB
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-filerd-HngnDYGk
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-unauthprxy-KXXsbWh
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-caf-3dXM8exv
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-9p23Jj2a
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-gos-vuln-s9qS8kYL
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-vds-cmd-inj-VfJtqGhE
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-vds-cred-uPMp9zbY
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-ir800-img-verif-wHhLYHjK
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-onepk-rce-6Hhyt4dC
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-digsig-bypass-FYQ3bmVq
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-dos-TkuPVmZN
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-fnfv9-dos-HND6Fc9u
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-rce-uk8BXcUD
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ngwc-cmdinj-KEwWVWR
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sip-Cv28sQw2
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-USxSyTk5
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssh-dos-Un22sd2A
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj2-fOnjk2LD
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj3-44st5CcA
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj4-S2TmH7GA
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-PZgQxjfG
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdinj-zM283Zdw
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-rce-xYRSeMNH
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxPE-KgGvCAf9