It seems that companies will never stop being inconvenienced by some security flaws. Vulnerability testing experts report that Cisco has extended the update patch to address a critical denial of service (DoS) vulnerability that was first detected and corrected in 2016.
The vulnerability in question, tracked as CVE-2016-1409 is a flaw on the IPv6 packet processing feature present in multiple company products. If exploited, the vulnerability would allow an unauthenticated remote threat actor to prevent a vulnerable device from processing IPv6 traffic, generating the DoS condition on the targeted device.
“A hacker could exploit the vulnerability by sending specially crafted Neighbor Discovery (ND) packets to any affected device for its processing. If the flaw is successfully exploited, the DoS condition will be triggered,” the specialists added.
Among the devices affected by this vulnerability are all those working with the following systems:
- Cisco IOS XR
- Cisco IOS
- Cisco IOS XE
- Cisco NX-OS
- Cisco ASA
- Cisco StarOS
This means that the vulnerability is not limited to products developed by Cisco. “This is a clear example of a configuration error in a software vendor; any device that is unable to discard these specially crafted packages could be impacted by the vulnerability,” say vulnerability testing experts. For example, some older versions of Juniper Junos and Huawei devices could also be vulnerable to this attack variant.
Upon publication of reports on the resurgence of the vulnerability, various members of the cybersecurity community questioned the company, which responded by announcing the extension of the original patch, released more than three years ago. “Cisco is investigating its entire product line to determine the scope of the vulnerability as well as the potential impact on each product. Security patches for this vulnerability will be released and/or updated as soon as possible,” the company’s security report says.
Cisco is constantly developing security patches to fix multiple vulnerabilities present in its developments. According to vulnerability testing specialists from the International Institute of Cyber Security (IICS) a few weeks ago the company released patches to fix six critical vulnerabilities affecting various products such as Unified Computing System server line and 220 Series Smart switches.
All critical vulnerabilities recently fixed by the company are related to a remote hacker’s ability to take control over an exposed device.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.