Cisco has unleashed an extensive new round of security warnings \u2013 three of them \u201ccritical\u201d \u2013 mostly for users of its iOS XE software and industrial router family.\nIn total, Cisco issued 23 Security Advisories that describe 25 exposures in its IOS and IOS XE systems.\u00a0\u00a0\n\nBeyond the three critical advisories, 20 have a \u201cHigh\u201d impact rating. Cisco said that one vulnerability affects Cisco IOS, IOS XE, IOS XR, and NX-OS Software. Five vulnerabilities affect both Cisco IOS and IOS XE Software. Six vulnerabilities affect Cisco IOS Software and 10 affect Cisco IOS XE Software. Three vulnerabilities affect the Cisco IOx application environment.\nA number of the warnings are for a command-injection vulnerability\u201d that would let an attacker execute commands on the impacted OS.\nCisco has released free software updates that fix the critical warnings issued this week. The company also said customers can use the Cisco\u00a0Software Checker to search for critical or high rated advisories.\nThe critical warnings include:\n\nA vulnerability rated at 9.8 out of 10 on the Common Vulnerability Scoring System in the authorization controls for the Cisco\u00a0IOx application-hosting infrastructure in Cisco\u00a0IOS XE software could let an unauthenticated, remote attacker obtain an authorization token and execute any of the IOx API commands on an affected device. The vulnerability is due to incorrect handling of requests for authorization tokens. An attacker could exploit this vulnerability by using a crafted API call to request such a token.\nMultiple weaknesses rated at 9.8 on the CVSS in Cisco IOS software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could let an unauthenticated, remote attacker or an authenticated local attacker execute arbitrary code on an affected system or cause an affected system to crash and reload. The vulnerability is due to incorrect bounds checking of certain values in packets that are destined for UDP port 9700 of an affected device. An attacker could exploit this vulnerability by sending malicious packets to an affected device. When the packets are processed, an exploitable buffer-overflow condition may occur, Cisco stated.\nA vulnerability rated at 8.8 on the CVSS in the implementation of the inter-VM channel of Cisco\u00a0IOS software for Cisco\u00a0809 and 829 Industrial Integrated Services Routers (Industrial ISR) and Cisco\u00a01000 Series Connected Grid Routers (CGR1000) could let an attacker execute arbitrary commands in the context of the Linux shell of the virtual device server (VDS) with the privileges of the\u00a0 root. Because the device is designed on a hypervisor architecture, exploitation of a vulnerability that affects the inter-VM channel may lead to a complete system compromise. The vulnerability is due to insufficient validation of signaling packets that are destined to the VDS. An attacker could exploit this vulnerability by sending malicious packets to an affected device, Cisco stated.