News Stay informed about the latest enterprise technology news and product updates.

Cisco releases updates for multiple flaws

Cisco Systems Inc. is addressing a number of flaws in its devices, including a critical vulnerability in its Unified Communications Manager that could be exploited remotely.

Cisco Systems Inc. has released a security update addressing a critical flaw in its Unified Communications Manager (UCM) that could be remotely exploited to crash a system or execute malicious code. Updates also address flaws in the Cisco Firewall Services Module and Cisco PIX and ASA clients.

The San Jose, Calif.-based networking giant issued advisories late Wednesday warning customers that its UCM is prone to denial of service and buffer overflow vulnerabilities. Attackers can exploit holes in the UCM remotely to crash affected devices by triggering kernel panics, or to execute arbitrary machine code, Cisco said. The UCM contains a bug in the way it handles multiple UDP-based SIP messages which could result in a kernel panic. UCM 5 and 6 series are affected by the issues.

Cisco also released an update for its Firewall Services Module, warning users that the module contains three flaws that could results in a denial of service condition if successfully exploited by an attacker. The module contains two crafted packet vulnerabilities and a third flaw affecting access control list entries.

Meanwhile, Cisco said two crafted packet vulnerabilities exist in the Cisco PIX 500 Series security appliance (PIX) and the Cisco 5500 Series adaptive security appliance (ASA) that may result in a reload of the device. The appliances are used by customers running clientless WebVPN connections, HTTPS management sessions, cut-through proxy for network access, and TLS proxy for encrypted voice inspection, Cisco said.

Danish vulnerability clearinghouse Secunia labeled the threat "moderately critical" in its security advisory. Secunia said the packet vulnerabilities could result in a denial of service condition.

"Successful exploitation of this vulnerability requires that the MGCP application layer protocol inspection is enabled," Secunia said.

Dig Deeper on Network device security: Appliances, firewalls and switches

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.