Cisco has issued another batch of security warnings that include problems in its Firepower firewall (FXOS), \u00a0Unified Computing System (UCS) software and Nexus switch operating system (NX-OS) .\n\nThe firewall and UCS vulnerabilities all have a severity level of \u201chigh\u201d on the Common Vulnerability Scoring System and include:\n\nA vulnerability in the CLI of Cisco FXOS Software and Cisco UCS Manager Software could let an authenticated, local attacker execute arbitrary commands on the underlying operating system (OS). The vulnerability is due to insufficient input validation. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently logged-in user for all affected platforms excluding Cisco UCS 6400 Series Fabric Interconnects. On Cisco UCS 6400 Series Fabric Interconnects, the injected commands are executed with root privileges, Cisco stated.\nA second vulnerability in the local management of the same CLI interface in \u00a0Cisco\u00a0FXOS Software and Cisco\u00a0UCS Manager Software could allow similar problems.\nA weakness in the Cisco\u00a0Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could let an unauthenticated, adjacent attacker exploit this vulnerability by sending a crafted Cisco\u00a0Discovery Protocol packet to a Layer 2-adjacent affected device. (Cisco Discovery Protocol is a Layer 2 protocol.) To exploit this vulnerability, an attacker must be Layer 2 adjacent\u00a0\u2013 in the same broadcast domain \u2013 as the affected device\u00a0 A successful exploit could lead to a buffer overflow that could then allow attackers to execute arbitrary code as root or cause a DoS condition on the affected device. The vulnerability exists because of insufficiently validated Cisco\u00a0Discovery Protocol packet headers, Cisco stated.\n\nCisco also noted that this problem is different from the ones it detailed earlier this month here: Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability and Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability.\nThese vulnerabilities were found by Cisco during internal security testing and the company has released software updates that address the issues.\nOther security problems with a high rating include one in the resource-handling system of Cisco NX-OS Software for Cisco MDS 9000 Series Multilayer Switches that could let an attacker set off a DoS attack. An attacker could exploit this vulnerability by sending traffic to the management interface (mgmt0) of an affected device at very high rates. An exploit could allow the attacker to cause unexpected behaviors such as high CPU usage, process crashes, or even full system reboots of an affected device. The vulnerability is due to improper resource usage control, Cisco stated. \u00a0Cisco has addressed the vulnerability and more information can be found here.\nAnother vulnerably with a high rating was found in the Secure Login Enhancements capability of Cisco Nexus 1000V Switch for VMware vSphere.\u00a0 This weakness could let an attacker perform a high amount of login attempts against the affected device. A successful exploit could cause the affected device to become inaccessible to other users, resulting in a DoS situation.\u00a0 The vulnerability is due to improper resource allocation during failed CLI login attempts when login parameters that are part of the Secure Login\u00a0Enhancements capability are configured on an affected device, Cisco stated.\u00a0 Cisco has released software updates that address this vulnerability.\nCisco issued a number of other NS-OX vulnerability warnings that garnered \u201cmedium\u201d level notices including issues with Border Gateway Protocol, Address Resolution Protocol and the NX-API system.