Cisco patches critical bugs in its VOIP phones

walden, system, systems, walden systems, rita, firewall, port, forward, up, protect, intrusion, security, traffic, DMZ, block, protection, walden systems, walden, systems, network, fire, wall, hack, intrusion, cisco, router, network, switch, hub, IoT, traffic
Rita gives you full control of what sites your employees visit. Rita can block sites that eat up your precious bandwidth such as media streaming sites. Rita enables you full control of what sites your employees can and cannot visit. Rita gives you the ability to block undesirable sites by wildcard or by name. Rita gives you the ability to determine which computers will be blocked and which will be allowed. With Rita, you can block access to sensitive servers within your LAN.



     Many business customers could be impacted by a high-severity security flaw discovered in Cisco VoIP phones. Cisco issued a patch on Wednesday. Cisco also patched two medium-security flaws today in its FireSIGHT management platform for network security and one medium-severity issue in the Web Security Appliance. Finally, it issued a fix for a high-severity bug in its platform for mobile operator routers, StarOS.

     The most critical, CVE-2018-0341, could allow command injection and remote code execution on IP phones, including higher-end models that have HD video call functionality. The advisory stated that thanks to insufficient input validation, an authenticated user could send specially crafted shell commands to a specific user input field using the web-based user interface that links to the handsets. That could result in the ability to inject and execute arbitrary shell commands, opening the door for hackers to eavesdrop on conversations, intercept media data, place phone calls and more. The vulnerability, found by Cisco, affects IP Phone 6800, 7800 and 8800 series devices that run a Multiplatform Firmware release prior to Release 11.2. No exploits have yet been seen in the wild and the requirement for a hacker to be logged into the user interface in order to launch an attack somewhat lessens the severity of the issue.




     Cisco also fixed two medium-severity flaws in the Cisco FireSIGHT System Software, which provides centralized management for network security and operational functions for Cisco ASA with FirePOWER services and Cisco FirePOWER network security appliances. It automatically aggregates and correlates threat information for business users. The first issue is a file policy bypass vulnerability, found in the detection engine of FireSIGHT. An unauthenticated, remote hacker could send a maliciously crafted FTP connection to transfer a file to an affected device. That file could carry malware built to disable the detection mechanisms in the system or carry out other malicious actions. A successful attack could allow the hacker to bypass a file policy that is configured to apply the block upload with reset action to FTP traffic.

     The second vulnerability, CVE-2018-0384, is in same detection engine could allow an unauthenticated, remote hacker to bypass a URL-based access control policy that is configured to block traffic for an affected system. The vulnerability exists because the affected software incorrectly handles TCP packets that are received out of order when a TCP SYN retransmission is issued. A hacker could exploit this vulnerability by sending a maliciously crafted connection through an affected device. A successful exploit could allow the attacker to bypass a URL-based access control policy that is configured to block traffic for the affected system.



     Other security issues patches were CVE-2018-0366 and CVE-2018-0369. CVE-2018-0366 is a cross-site scripting vulnerability in the web-based management interface of the Cisco Web Security Appliance. Using social engineering, a hacker could convince an interface user to click a specially crafted link that would then give hackers the ability to execute arbitrary script code in the context of the interface, or allow the hacker to access sensitive browser-based information. CVE-2018-0369 is a high-severity StarOS IPv4 fragmentation denial-of-service vulnerability. StarOS powers next-generation mobile networks, which support everything from tablets and smartphones to connected cars, smart-city and other IoT deployments. The platform provides virtualization and intelligence for mobile network architectures, and allows dynamic resource allocation for mobile services and networks to help wireless carriers manage their bandwidth to deliver higher levels of service to consumers and businesses.

     Internal security testing uncovered a vulnerability in the reassembly logic for fragmented IPv4 packets of Cisco StarOS running on virtual platforms. An attack could allow an unauthenticated, remote hacker to trigger a reload of the npusim process, resulting in a DoS condition. There are four instances of the npusim process running per Service Function instance, each handling a subset of all traffic flowing across the device. It is possible to trigger a reload of all four instances of the npusim process around the same time. The result would be mobile service interruption, which would be felt by everyday users as a short connectivity glitch. An attack could allow the hacker to trigger a restart of the npusim process, which will result in all traffic queued toward this instance of the npusim process to be dropped while the process is restarting. The npusim process typically restarts within less than a second. This vulnerability affects the Cisco Virtualized Packet Core-Single Instance, the Cisco Virtualized Packet Core-Distributed Instance, and the Cisco Ultra Packet Core, if they're running any release of the StarOS operating system prior to the first fixed release. The Cisco ASR 5000 series routers, Cisco Elastic Services Controllers and Cisco Ultra Automation Services are not affected.