First published: Wed Mar 28 2018(Updated: )
This advisory is part of the March 28, 2018, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 20 Cisco Security Advisories that describe 22 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software | ||
Cisco IOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180328-xesc varies based on the specific vulnerability, but many are marked as high risk due to their potential impact.
To fix cisco-sa-20180328-xesc, you should apply the latest patches or updates provided by Cisco for the affected versions of IOS and IOS XE Software.
The products affected by cisco-sa-20180328-xesc include Cisco IOS and Cisco IOS XE Software.
cisco-sa-20180328-xesc includes a variety of vulnerabilities, including remote code execution, denial of service, and privilege escalation.
Specific workarounds may be available for some vulnerabilities listed in cisco-sa-20180328-xesc, but applying updates is the recommended course of action.