Cisco patches authentication, denial-of-service, NTP flaws in many products

20151005 Cisco headquarters sign

A large sign at the curb greets arrivals at Building 9 of the Cisco Systems campus in San Jose, California, on Oct. 5, 2015.

Credit: Stephen Lawson

Remote attackers can bypass authentication on Cisco RV220W wireless network security firewalls

RELATED TOPICS

Cisco Systems has released a new batch of security patches this week for flaws affecting a wide range of products, including for a critical vulnerability in its RV220W wireless network security firewalls.

The RV220W vulnerability stems from insufficient input validation of HTTP requests sent to the firewall's Web-based management interface. This could allow remote unauthenticated attackers to send HTTP requests with SQL code in their headers that would bypass the authentication on the targeted devices and give attackers administrative privileges.

Cisco has patched this vulnerability in the 1.0.7.2 firmware version for RV220W devices. Manual workarounds include disabling the remote management functionality or restricting it to specific IP addresses.

The company also patched high- and medium-severity denial-of-service vulnerabilities in Cisco Wide Area Application Service (WAAS) appliances and modules, Cisco Small Business 500 Series switches and the SG300 managed switch. A cross-site scripting vulnerability was also patched in the Web-based management interface of Cisco Unity Connection.

Finally, the company imported patches for 12 vulnerabilities in the Network Time Protocol daemon (ntpd) that were fixed on Jan. 19 by the Network Time Foundation. These flaws can be exploited by attackers to modify the time on devices or to crash the ntpd process.

Having the correct time on system is important for a variety of applications, including security-sensitive operations.

The NTP flaws are suspected to affect more than 70 Cisco products used for collaboration and social media products, network and security, routing and switching, unified computing and communications, streaming and transcoding, wireless and hosted services.

The company has published firmware updates for some of them as well as a list of affected products and available patches that it will likely update as it releases more fixes.

RELATED TOPICS
Call on line 2! Six ways to add a second line to your smartphone
View Comments
Join the discussion
Be the first to comment on this article. Our Commenting Policies