Wednesday, April 9, 2025
HomeSecurity UpdateCisco Released Security Updates and Fixed Critical Vulnerabilities that Affected Cisco Products

Cisco Released Security Updates and Fixed Critical Vulnerabilities that Affected Cisco Products

Published on

SIEM as a Service

Follow Us on Google News

Cisco Security updates released with fixes for 8 vulnerabilities that affected the Cisco products and one those flaws allow remote attackers to execute the arbitrary code and taking the system control.

Security updates contain 2 severity flow fixed under “Critical” category and the remaining 6 vulnerabilities are addressed under “Medium” severity.

Cisco does not provide vulnerability details that could enable someone to craft an exploit and the fixed vulnerabilities are affected directly by the Cisco products.

- Advertisement - Google News

Critical Vulnerabilities Under Cisco Security updates 

 1. Denial of Service Vulnerability (CVE-2018-0368

A critical vulnerability existing in the reassembly logic for fragmented IPv4 packets of Cisco StarOS running on virtual platforms allow a remote attacker can perform reload the process leads to perform denial of service (DoS) attack.

Improper handling of fragmented IPv4 packets Allows an attacker could exploit this vulnerability by sending a malicious IPv4 packet across an affected device.

2. Web UI Command Injection Vulnerability(CVE-2018-0341)

A command injection vulnerability affected the web-based UI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware which allow an attacker perform a command injection and execute commands with the privileges of the web server.

Medium Severity Vulnerabilities

1.Credential Logging Information Disclosure Vulnerability (CVE-2018-0368 )

A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an authenticated, local attacker to access sensitive information on an affected system.

2. Denial of Service Vulnerability (CVE-2018-0385)

A vulnerability in the detection engine parsing of Security Socket Layer (SSL) protocol packets for Cisco Firepower System Software could allow an attacker to perform a denial of service (DoS) condition due to the Snort process unexpectedly restarting.

3. Access Control Policy Bypass Vulnerability (CVE-2018-0384)

A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a URL-based access control policy that is configured to block traffic for an affected system.

4. Policy Bypass Vulnerability (CVE-2018-0383)

A vulnerability in the detection engine of Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass a file policy that is configured to block the transfer of files to an affected system via FTP.

5. Denial of Service Vulnerability (CVE-2018-0370)

A vulnerability in the detection engine of Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause one of the detection engine processes to run out of memory and thus slow down traffic processing.
 
6. Cross-Site Scripting Vulnerability (CVE-2018-0366)
 

A vulnerability in the web-based management interface of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.

Also Read

Microsoft Released Security Updates for July and Fixed 53 Security Vulnerabilities

Debian Released Security Updates for July and Fixed Multiple Package Vulnerabilities

Apple Released Security Updates for iOS, macOS, Safari, iTunes – iOS 11.4.1 Released

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CISA Issues Alert on Active Exploits of Windows CLFS Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding active...

Apache mod_auth_openidc Flaw Lets Unauthenticated Users Access Protected Data

A critical flaw in Apache mod_auth_openidc (versions ≤2.4.16.10) allows unauthenticated attackers to bypass authentication and access...

NCSC Issues Alert on MOONSHINE and BADBAZAAR Mobile Malware

GCHQ’s National Cyber Security Centre (NCSC), in collaboration with international and industry partners, has...

20 Best Incident Response Tools in 2025

In today's digital era, organizations face an ever-growing threat landscape, with cyberattacks, data breaches,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ghidra 11.3 Released – A Major Update to NSA’s Open-Source Tool

The National Security Agency (NSA) has officially released Ghidra 11.3, the latest iteration of...

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access

On February 3, 2025, Google published its February Android Security Bulletin, which addresses a...

Beware of SmartApeSG Campaigns that Deliver NetSupport RAT

SmartApeSG, a FakeUpdate cyber threat, has emerged as a significant vector for delivering NetSupport...