Cisco latest round of security updates addresses 29 vulnerabilities in multiple Cisco products that could allow a remote attacker to take control of an affected system and one of which is being actively exploited in Sea Turtle campaign.

Admins in charge of Cisco ASR 9000 Series Aggregation Services Routers have been instructed to urgently address the flaw as the most severe of the bugs has a severity rating of 9.8 out of a possible 10.

ASR flaw CVE-2019-1710  is a “vulnerability in the sysadmin virtual machine (VM) on Cisco ASR 9000 Series Aggregation Services Routers running Cisco IOS XR 64-bit Software could allow an unauthenticated, remote attacker to access internal applications running on the sysadmin VM,” according to an April 17 security update.

The vulnerability is caused by an incorrect isolation of the secondary management interface from internal sysadmin applications that can be exploited by connecting to one of the listening internal applications. Exploitation results in unstable conditions including a denial of service and remote unauthenticated access to the device.

Cisco also issued alerts for two previously patched bugs that were being exploited in a state-sponsored DNS hijacking campaign dubbed Sea Turtle.