Cisco Security Updates

Number: AV18-073
Date: 02 May 2018

Purpose

The purpose of this advisory is to bring attention to multiple Cisco security advisories.

Assessment

Cisco released multiple security updates to address vulnerabilities (medium to critical) in various Cisco products.

Affected Products:
- Cisco WebEx Advanced Recording Format Remote Code Execution Vulnerability
- Cisco Prime File Upload Servlet Path Traversal and Remote Code Execution Vulnerability
- Cisco Secure Access Control System Remote Code Execution Vulnerability
- Cisco Wireless LAN Controller 802.11 Management Frame Denial of Service Vulnerability
- Cisco Wireless LAN Controller IP Fragment Reassembly Denial of Service Vulnerability
- Cisco Meeting Server Remote Code Execution Vulnerability
- Cisco Aironet 1810, 1830, and 1850 Series Access Points Point-to-Point Tunneling Protocol Denial of Service Vulnerability
- Cisco Aironet 1800, 2800, and 3800 Series Access Points Secure Shell Privilege Escalation Vulnerability
- Cisco IOS, IOS XE, and IOS XR Software Link Layer Discovery Protocol Buffer Overflow Vulnerabilities
- Cisco 5500 and 8500 Series Wireless LAN Controller Information Disclosure Vulnerability
- Cisco WebEx Advanced Recording Format Player Remote Code Execution Vulnerability
- Cisco WebEx Recording Format Player Information Disclosure Vulnerability
- Cisco Prime Service Catalog User Interface Denial of Service Vulnerability
- Cisco IOS XR Software netconf Denial of Service Vulnerability
- Cisco Firepower System Software Transport Layer Security Extensions Denial of Service Vulnerability
- Cisco Firepower System Software Cross-Origin Domain Protection Vulnerability
- Cisco Firepower System Software Transport Layer Security Denial of Service Vulnerability
- Cisco Aironet Access Points Central Web Authentication FlexConnect Client ACL Bypass Vulnerability
- Cisco Aironet 1800 Series Access Point 802.11 Denial of Service Vulnerability
- Cisco Wireless LAN Controller and Aironet Access Points IOS WebAuth Client Authentication Bypass Vulnerability

CVE References: CVE-2018-0167, CVE-2018-0175, CVE-2018-0226, CVE-2018-0234, CVE-2018-0235, CVE-2018-0245, CVE-2018-0247, CVE-2018-0249, CVE-2018-0250, CVE-2018-0252, CVE-2018-0253, CVE-2018-0258, CVE-2018-0262, CVE-2018-0264, CVE-2018-0278, CVE-2018-0281, CVE-2018-0283, CVE-2018-0285, CVE-2018-0286, CVE-2018-0287, CVE-2018-0288

Suggested Action

CCIRC recommends that system administrators test and deploy the vendor-released updates to affected applications accordingly.

References:

Note to Readers

In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.

Please note, CCIRC PGP key has recently been updated.
http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/_fl/CCIRCPublicPGPKey.txt

For general information, please contact Public Safety Canada's Public Affairs division at:

Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589
E-mail: ps.communications-communications.sp@canada.ca

Date modified: