Cisco released several security patches addressing 36 vulnerabilities on 3-4 October, three of which were rated "critical" and eight of which were rated "high" with some of the exploits allowing an attacker to take control of an affected system.
Critical vulnerabilities include a prime infrastructure arbitrary file upload and command execution vulnerability, a digital network architecture center unauthenticated access vulnerability, and a digital network architecture center authentication bypass vulnerability, according to the security updates.
The prime infrastructure arbitrary file upload and command execution flaw is a vulnerability in which the HTTP web server for Cisco Prime Infrastructure (PI) has unrestricted directory permissions and could allow an unauthenticated, remote attacker to upload an arbitrary file. It is caused by an incorrect permission setting for important system directories.
The digital network architecture center unauthenticated access vulnerability is the result of an insecure default configuration of the affected system and the digital network architecture center authentication bypass vulnerability is caused by insufficient security restrictions for critical management functions.
Cisco also released an update to address a "high" rated Linux Kernel IP fragment reassembly denial of service vulnerability. This vulnerability could allow an unauthenticated remote attacker to carry out denial of service conditions on the victim’s device.
The bug affects Linux Kernel Version 3.9 and later and is caused by inefficient IPv4 and IPv6 fragment reassembly algorithms in the IP stack that is used by the affected kernel.