Cisco routers have major security flaw

(Image credit: Cisco)

In is bi-annual software security advisory bundle for its Cisco IOS and IOS XE products, Cisco has disclosed more than a dozen high-severity vulnerabilities in its network automation software.

The networking giant is recommending that all admins review which versions of Cisco IOS and IOS XE their devices are running to make sure that they have been updated to versions that address the 13 separate flaws it discovered.

The 13 high-severity vulnerabilities disclosed by Cisco could give an attacker unauthorized access to an affected device, allow them to run a command-injection attack, or deplete a device's resources which would lead to a denial of service.

The CVE-2019-12648 bug in the IOx application environment of IOS is the most severe and it affects large network operators who use the company's 800 Series Industrial Integrated Services Routers and its 1000 Series Connected Grid Routers. Luckily though, the bug is contained within a guest operating system running on a virtual machine of an affected IOS device. However, it can be remedied by upgrading to a fixed version of IOS but if this is not possible, Cisco suggests that users disable the guest OS and it provided instructions on how to uninstall it in its advisory.

Layer 2 network traceroute utility

Cisco has also published an advisory regarding an issue in the Layer 2 network traceroute utility in IOS and IOS XE. Cisco Catalyst switches have this feature enabled by default and according to the company, public exploit code is already available for this issue.

The L2 traacerout server does not require authentication by design and this means that an attacker can collect loads of information about an affected device including the hostname, hardware model, configured interfaces and IP addresses, VLAN database, Mac address, Layer 2 filtering table and Cisco Discovery Protocol neighbor information.

In its advisory regarding this issue, Cisco explained that: “Reading this information from multiple switches in the network could allow an attacker to build a complete L2 topology map of that network.”

To fix the issue, users can disable their L2 tracerouter server manually or upgrade to a version of IOS or IOS XE that has it disabled by default. However, the later won't be possible until later this year when Cisco releases updated versions of the software.

Via ZDNet

Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)