Cisco informed customers on Wednesday that some of its industrial routers are exposed to attacks due to a critical remote code execution vulnerability in the IOx application environment.
The flaw, identified as CVE-2017-3853, affects the Data-in-Motion (DMo) process of IOx and is caused by the lack of proper bounds checking. A remote, unauthenticated attacker can exploit the vulnerability to trigger a stack overflow by sending specially crafted packets that are forwarded to the DMo process for evaluation.
Successful exploitation of the security hole can allow the attacker to execute arbitrary code with root privileges in the virtual instance running on the vulnerable device. However, Cisco pointed out that the router itself is not impacted.
The vulnerability affects Cisco IR809 and IR829 industrial integrated services routers running IOx versions 188.8.131.52 and 184.108.40.206. Users can determine what version is running on their devices through the IOx Local Manager interface.
The flaw has been patched with the release of IOx 220.127.116.11 and Cisco says it’s not aware of any attacks exploiting this vulnerability.