Cisco Patches Flaws in Webex, SD-WAN, Other Products

Cisco on Wednesday informed customers that security updates are available for several of the company’s products, including SD-WAN, Webex, Firepower, IoT Field Network Director, Identity Services Engine, and Small Business routers.

Only one vulnerability has been classified by the networking giant as “critical.” Tracked as CVE-2019-1651, the flaw affects the vContainer component in Cisco’s SD-WAN solution and it can be exploited by a remote, authenticated attacker to cause a DoS condition and possibly to execute arbitrary code with root privileges. Exploitation of the weakness requires sending a specially crafted file that triggers a buffer overflow.

Several other vulnerabilities, classified as “high severity” based on their CVSS score, have been addressed by Cisco in SD-WAN. This includes flaws that can be exploited to bypass authentication, escalate privileges on a device, and overwrite arbitrary files. In most cases, exploitation requires the attacker to authenticate on the targeted system.

Several “high severity” flaws have also been patched by Cisco in its Webex products, including a command execution issue in the Webex Teams client, and five code execution flaws in the Windows versions of Webex Network Recording Player and Webex Player.

Two serious vulnerabilities have also been patched in Cisco’s Small Business RV320 and RV325 routers. One of them allows a remote and unauthenticated attacker to obtain sensitive information, while the other can be exploited for arbitrary command injection, but exploitation requires admin privileges.

RedTeam Pentesting, the company credited by Cisco for finding the router vulnerabilities, has published some advisories of its own.

In its Firepower firewall, Cisco resolved a security bypass and DoS vulnerability that can be exploited remotely without authentication. A DoS issue has also been addressed in the Cisco IoT Field Network Director product.

Finally, a privilege escalation flaw that can be exploited to obtain “super admin” permissions has been fixed in the Identity Services Engine.

Cisco says there is no indication that any of the flaws patched this week have been exploited for malicious purposes. Many of the vulnerabilities were found by Cisco itself.

Related: Cisco Patches Privilege Escalation Vulnerability in Adaptive Security Appliance

Related: Cisco Warns of Zero-Day Vulnerability in Security Appliances

Related: Default Account Exposes Cisco Switches to Remote Attacks

Related: Cisco Patches Serious DoS Flaws in Email Security Appliance

Original author: Eduard Kovacs