If you are a security admin with lots of systems running Cisco IOS and IOS XE software today is decidedly not your day.\nCisco this week posted 25 \u201cHigh\u201d rated security advisories that stem from 34 vulnerabilities the company suggests should be fixed as soon as possible. The vulnerabilities impact a wide-range of Cisco gear as IOS and IOS XE are the company\u2019s most widely used operating systems. The warnings affect firewalls, wireless access points and switches.\n\nFor example, one of the highest rated threats--with an 8.6 out of 10 threat level, are multiple vulnerabilities in the Zone-Based Firewall feature of Cisco\u00a0IOS XE Software that could let an remote attacker to cause the device to reload or stop forwarding traffic through the firewall,resulting in a denial of service (DoS).\nCisco stated that the vulnerabilities are due to incomplete handling of Layer 4 packets through the device. An attacker could exploit these vulnerabilities by sending a certain sequence of traffic patterns through the device.\u00a0\nAnother 8.6-rated vulnerability involves the Split DNS feature of Cisco\u00a0IOS Software and Cisco\u00a0IOS XE Software could let an unauthenticated, remote attacker cause an affected device to reload, resulting in a DoS condition.\n\u201cThe vulnerability occurs because the regular expression (regex) engine that is used with the Split DNS feature of affected releases may time out when it processes the DNS name list configuration. An attacker could exploit this vulnerability by trying to resolve an address or hostname that the affected device handles,\u201d Cisco stated.\nStill another 8.6-rated security threat involves a vulnerability in the DHCP message handler of Cisco IOS XE Software for Cisco cBR-8 Converged Broadband Routers.\u00a0 The vulnerability is due to insufficient error handling when DHCP version 4 (DHCPv4) messages are parsed. An attacker could exploit this vulnerability by sending a malicious DHCPv4 message to or through a WAN interface of an affected device. A successful exploit could allow the attacker to cause a reload of the affected device, Cisco stated.\nSome of the other threat advisories include:\n\nA vulnerability in the WPA2 and WPA3 security implementation of Cisco\u00a0IOS XE Wireless Controller Software for the Cisco\u00a0Catalyst 9000 Family could let an unauthenticated, adjacent attacker send a crafted authentication packet to an affected device. A successful exploit could cause it to reload, resulting in a DoS condition. The vulnerability is due to incorrect packet processing during the WPA2 and WPA3 authentication handshake when configured for dot1x or pre-shared key (PSK) authentication key management (AKM) with 802.11r BSS Fast Transition (FT) enabled, Cisco stated.\nA vulnerability in the Umbrella Connector component of Cisco\u00a0IOS XE Software for Cisco\u00a0Catalyst 9200 Series Switches could allow an unauthenticated, remote attacker to trigger a reload, resulting in a DOS condition on an affected device. The vulnerability is due to insufficient error handling when parsing DNS requests. An attacker could exploit this vulnerability by sending a series of malicious DNS requests to an Umbrella Connector client interface of an affected device.\nMultiple vulnerabilities in the web management framework of Cisco\u00a0IOS XE Software could allow an authenticated, remote attacker with read-only privileges to elevate them to Administrator on an affected device. For example, a vulnerability in the APIs of the web management framework of Cisco\u00a0IOS XE Software could lead to such an attack. Another weakness in the authentication controls of the web management framework of Cisco\u00a0IOS XE Software could allow an authenticated, remote attacker with read-only privileges to elevate privileges to Administrator on an affected device.\n\nWorkarounds are not available, but patches or software updates addressing all of the vulnerabilities are available, Cisco stated.