Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom Lenovo Newsroom Nutanix Newsroom Cisco Live Newsroom HPE Zone Tech Provider Zone

Cisco Warns Users Of DoS, SQL Injection Flaws

Cisco released two security advisories Wednesday warning users about several SQL injection and DoS vulnerabilities in its Unified Communications Manager and Wireless LAN Controllers that could enable hackers to launch malicious attacks.

Unified Communications LAN

One advisory warned of multiple security flaws in Cisco Unified Communications Manager , including three denial of service (DoS) vulnerabilities affecting session initiation protocol (SIP) services, two SQL injection vulnerabilities and a directory transversal bug in the platform. The bugs affect Unified Communications Manager version 6x through 8x.

The three DoS bugs could pave the way for an attack that could ultimately disrupt voice services, escalate user privileges or change or delete data. In a DoS attack scenario, attackers could cause the Unified Communications Manager processes to restart or remain shut down for an extended period of time.

The platform is also affected by a critical directory transversal vulnerability involving the processing of POST requests. In an attack scenario, an authenticated remote hacker with the ability to intercept a packet on the affected device could upload a malicious file by sending it to a different location or with a different filename.

The Unified Communications Manager is also affected by two SQL injection vulnerabilities, both of which could enable a hacker to alter the system configuration remotely, without any user intervention.

Meanwhile, Cisco also issued a warning about a DoS flaw in its Wireless LAN Controller product family, which could be exploited by unauthenticated hackers intending to cause a device reload by sending a series of ICMP packets. Attackers could exploit the vulnerability from both wired and wireless segments.

If the vulnerability was successfully exploited, a hacker could cause the targeted device to reload, resulting in a prolonged DoS attack.

There are no workarounds available for the LAN bug, however, Cisco issued a free software update to address the flaw.

Thus far there are no signs that any of the vulnerabilities are being exploited in active attacks, according to Cisco PSIRT security research team.

Back to Top



sponsored resources