Cisco patches 12 vulnerabilities

In an advisory, Cisco Systems notified users of 12 security patches to fix vulnerabilities in its Internet Operating System (IOS) Software and Unified Communications Manager.

 

All but one of the patches correct vulnerabilities in the Internet IOS software. The patches come with accompanying advisories describing the program bugs.

 

There have been no known instances of malicious use of the vulnerabilities described in the advisories, Jean Reese, senior manager of Cisco's product security incident response team (PSIRT), told SCMagazineUS.com Friday.

 

The vulnerabilities were discovered during internal testing and while handling customer service requests.

 

“This is the second time we have done a scheduled bundle and this is in direct response to feedback we have gotten from customers,” Reese said.

 

The next bundle of security patches is scheduled to be published in March 2009.

 

“We have a lot of different customers that use IOS across a myriad of products. We encourage customers to read the advisories,” Reese said.

 

Cisco rated the vulnerabilities using the CVSS scoring system, which relates the score to the core confidentiality, integrity and availability principles.

 

Cisco's highest rated vulnerability, “uBR10012 Series Devices SNMP Vulnerability” was rated a 10 base score. The lowest rated vulnerability, “Cisco IOS MPLS VPN May Leak Information,” was rated a 5.1 base score.

 

“Cisco uBR10012 series devices automatically enable Simple Network Management Protocol (SNMP) read/write access to the device if configured for linecard redundancy. This can be exploited by an attacker to gain complete control of the device,” Cisco's advisory stated.

 

Symantec Corp.'s security level ThreatCon Rating went from an “elevated” level 2, where it was on Thursday, to a “low” level 1, Friday.

 

“Patches for the Cisco uBR10012 Router Default SNMP Community Vulnerability have been available for over 24 hours. DeepSight Threat Management System (TMS) Sensors have not registered any significant activity that can be verified as malicious,” Symantec said on its website.

 

Secunia, in a separate advisory, rated the vulnerabilities a 3 out of 5, which it calls "moderately critical."

 

The SANS Internet Storm Center rated four of the vulnerabilities at their highest threat level, "patch now," six of the vulnerabilities “critical,” and two “important.”

 

 

 

 

 

 

 

 


Sign up to our newsletters

More in News

Bitcoin mining botnet has become one of the most prevalent cyber threats

Fortinet researchers have tracked 100,000 new ZeroAccess trojan infections per week, making the botnet very lucrative to its owners.

House Intelligence Committee OKs amended version of controversial CISPA

House Intelligence Committee OKs amended version of controversial ...

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

Judge rules hospital can ask ISP for help ...

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.