Security Alerts

Cisco Data Center Network Manager Authorization Bypass Vulnerabilities

Cisco Security Advisories - Wed, 2021-01-20 16:00

Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization.

For more information about these vulnerabilities, see the Details section of this advisory.

Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu


Security Impact Rating: Medium
CVE: CVE-2021-1269,CVE-2021-1270
Categories: Security Alerts

Cisco Data Center Network Manager REST API Vulnerabilities

Cisco Security Advisories - Wed, 2021-01-20 16:00

Multiple vulnerabilities in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization.

For more information about these vulnerabilities, see the Details section of this advisory.

Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p


Security Impact Rating: Medium
CVE: CVE-2021-1133,CVE-2021-1135,CVE-2021-1255
Categories: Security Alerts

Cisco Smart Software Manager Satellite Open Redirect Vulnerability

Cisco Security Advisories - Wed, 2021-01-20 16:00

A vulnerability in the web management interface of Cisco Smart Software Manager satellite could allow an authenticated, remote attacker to redirect a user to an undesired web page.

The vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request that could cause the web application to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious website.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssmor-MDCWkT2x


Security Impact Rating: Medium
CVE: CVE-2021-1218
Categories: Security Alerts

Cisco Smart Software Manager Satellite SQL Injection Vulnerability

Cisco Security Advisories - Wed, 2021-01-20 16:00

A vulnerability in the web-based management interface of Cisco Smart Software Manager Satellite could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.

The vulnerability exists because the web-based management interface improperly validates values within SQL queries. An attacker could exploit this vulnerability by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database or the operating system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-sqi-h5fDvZWp


Security Impact Rating: Medium
CVE: CVE-2021-1222
Categories: Security Alerts

Cisco Smart Software Manager Satellite Static Credential Vulnerability

Cisco Security Advisories - Wed, 2021-01-20 16:00

A vulnerability in Cisco Smart Software Manager Satellite could allow an authenticated, local attacker to access sensitive information on an affected system.

The vulnerability is due to insufficient protection of static credentials in the affected software. An attacker could exploit this vulnerability by gaining access to the static credential that is stored on the local device. A successful exploit could allow the attacker to view static credentials, which the attacker could use to carry out further attacks.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-sc-Jd42D4Tq


Security Impact Rating: High
CVE: CVE-2021-1219
Categories: Security Alerts

Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities

Cisco Security Advisories - Wed, 2021-01-20 16:00

Multiple vulnerabilities in the web UI of Cisco Smart Software Manager Satellite could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system.

For more information about these vulnerabilities, see the Details section of this advisory.

Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-multici-pgG5WM5A


Security Impact Rating: Critical
CVE: CVE-2021-1138,CVE-2021-1139,CVE-2021-1140,CVE-2021-1141,CVE-2021-1142
Categories: Security Alerts

Cisco StarOS IPv4 Denial of Service Vulnerability

Cisco Security Advisories - Wed, 2021-01-20 16:00

A vulnerability in the IPv4 protocol handling of Cisco StarOS could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

The vulnerability is due to a memory leak that occurs during packet processing. An attacker could exploit this vulnerability by sending a series of crafted IPv4 packets through an affected device. A successful exploit could allow the attacker to exhaust the available memory and cause an unexpected restart of the npusim process, leading to a DoS condition on the affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr-mem-leak-dos-MTWGHKk3


Security Impact Rating: Medium
CVE: CVE-2021-1353
Categories: Security Alerts

Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021

Cisco Security Advisories - Tue, 2021-01-19 12:15

A set of previously unknown vulnerabilities in the DNS forwarder implementation of dnsmasq were disclosed on January 19, 2021. The vulnerabilities are collectively known as DNSpooq.

Exploitation of these vulnerabilities could result in remote code execution or denial of service (DoS), or may allow an attacker to more easily forge DNS answers that can poison DNS caches, depending on the specific vulnerability.

Multiple Cisco products are affected by these vulnerabilities.

Cisco will release software updates that address these vulnerabilities. Any workarounds for a specific Cisco product or service will be documented in the relevant Cisco bugs, which are identified in the Vulnerable Products section of this advisory.

Note: At the time of publication, no Cisco products were found to be affected by the remote code execution and DoS vulnerabilities, which are identified by the following Common Vulnerabilities and Exposures (CVE) IDs:

  • CVE-2020-25681 
  • CVE-2020-25682
  • CVE-2020-25683
  • CVE-2020-25687

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g


Security Impact Rating: Medium
CVE: CVE-2020-25681,CVE-2020-25682,CVE-2020-25683,CVE-2020-25684,CVE-2020-25685,CVE-2020-25686,CVE-2020-25687
Categories: Security Alerts

Cisco AnyConnect Secure Mobility Client for Windows DLL Injection Vulnerability

Cisco Security Advisories - Wed, 2021-01-13 16:00

A vulnerability in the Network Access Manager and Web Security Agent components of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL injection attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system.

The vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system which, in turn, causes a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-injec-pQnryXLf


Security Impact Rating: High
CVE: CVE-2021-1237
Categories: Security Alerts

Cisco Webex Teams Shared File Manipulation Vulnerability

Cisco Security Advisories - Wed, 2021-01-13 16:00

A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface.

The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a file within the application interface. A successful exploit could allow the attacker to modify how the shared file name displays within the interface, which could allow the attacker to conduct phishing or spoofing attacks.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-7ZMcXG99


Security Impact Rating: Medium
CVE: CVE-2021-1242
Categories: Security Alerts

Cisco Webex Meetings Open Redirect Vulnerability

Cisco Security Advisories - Wed, 2021-01-13 16:00

A vulnerability in the web-based management interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to redirect a user to an untrusted web page, bypassing the warning mechanism that should prompt the user before the redirection.

This vulnerability is due to improper input validation of the URL parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website, bypassing the Webex URL check that should result in a warning before the redirection to the web page. Attackers may use this type of vulnerability, known as an open redirect attack, as part of a phishing attack to convince users to unknowingly visit malicious sites.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-open-redirect-PWvBQ2q


Security Impact Rating: Medium
CVE: CVE-2021-1310
Categories: Security Alerts

Cisco Webex Meetings and Cisco Webex Meetings Server Host Key Brute Forcing Vulnerability

Cisco Security Advisories - Wed, 2021-01-13 16:00

A vulnerability in the reclaim host role feature of Cisco Webex Meetings and Cisco Webex Meetings Server could allow an authenticated, remote attacker to take over the host role during a meeting.

This vulnerability is due to a lack of protection against brute forcing of the host key. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Webex Meetings Server site. A successful exploit would require the attacker to have access to join a Webex meeting, including applicable meeting join links and passwords. A successful exploit could allow the attacker to acquire or take over the host role for a meeting.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-brutef-hostkey-FWRMxVF


Security Impact Rating: Medium
CVE: CVE-2021-1311
Categories: Security Alerts

Cisco StarOS for Cisco ASR 5000 Series Routers Arbitrary File Read Vulnerability

Cisco Security Advisories - Wed, 2021-01-13 16:00

A vulnerability in the Secure FTP (SFTP) of Cisco StarOS for Cisco ASR 5000 Series Routers could allow an authenticated, remote attacker to read arbitrary files on an affected device. To exploit this vulnerability, the attacker would need to have valid credentials on the affected device.

The vulnerability is due to insecure handling of symbolic links. An attacker could exploit this vulnerability by sending a crafted SFTP command to an affected device. A successful exploit could allow the attacker to read arbitrary files on the affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-file-read-L3RDvtey


Security Impact Rating: Medium
CVE: CVE-2021-1145
Categories: Security Alerts

Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability

Cisco Security Advisories - Wed, 2021-01-13 16:00

Multiple Cisco products are affected by a vulnerability with TCP Fast Open (TFO) when used in conjunction with the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP.

The vulnerability is due to incorrect detection of the HTTP payload if it is contained at least partially within the TFO connection handshake. An attacker could exploit this vulnerability by sending crafted TFO packets with an HTTP payload through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-tfo-bypass-MmzZrtes


Security Impact Rating: Medium
CVE: CVE-2021-1224
Categories: Security Alerts

Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability

Cisco Security Advisories - Wed, 2021-01-13 16:00

Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP.

The vulnerability is due to incorrect handling of an HTTP range header. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured file policy for HTTP packets and deliver a malicious payload.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-filepolbypass-67DEwMe2


Security Impact Rating: Medium
CVE: CVE-2021-1223
Categories: Security Alerts

Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability

Cisco Security Advisories - Wed, 2021-01-13 16:00

Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system.

The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq


Security Impact Rating: Medium
CVE: CVE-2021-1236
Categories: Security Alerts

Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Stored Cross-Site Scripting Vulnerabilities

Cisco Security Advisories - Wed, 2021-01-13 16:00

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.

The vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device.

There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-LPTQ3EQC


Security Impact Rating: Medium
CVE: CVE-2021-1151,CVE-2021-1152,CVE-2021-1153,CVE-2021-1154,CVE-2021-1155,CVE-2021-1156,CVE-2021-1157,CVE-2021-1158
Categories: Security Alerts

Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities

Cisco Security Advisories - Wed, 2021-01-13 16:00

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. 

The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device.

Cisco has not released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U


Security Impact Rating: High
CVE: CVE-2021-1159,CVE-2021-1160,CVE-2021-1161,CVE-2021-1162,CVE-2021-1163,CVE-2021-1164,CVE-2021-1165,CVE-2021-1166,CVE-2021-1167,CVE-2021-1168,CVE-2021-1169,CVE-2021-1170,CVE-2021-1171,CVE-2021-1172,CVE-2021-1173,CVE-2021-1174,CVE-2021-1175,CVE-2021-1176,CVE-2021-1177,CVE-2021-1178,CVE-2021-1179,CVE-2021-1180,CVE-2021-1181,CVE-2021-1182,CVE-2021-1183,CVE-2021-1184,CVE-2021-1185,CVE-2021-1186,CVE-2021-1187,CVE-2021-1188,CVE-2021-1189,CVE-2021-1190,CVE-2021-1191,CVE-2021-1192,CVE-2021-1193,CVE-2021-1194,CVE-2021-1195,CVE-2021-1196,CVE-2021-1197,CVE-2021-1198,CVE-2021-1199,CVE-2021-1200,CVE-2021-1201,CVE-2021-1202,CVE-2021-1203,CVE-2021-1204,CVE-2021-1205,CVE-2021-1206,CVE-2021-1207,CVE-2021-1208,CVE-2021-1209,CVE-2021-1210,CVE-2021-1211,CVE-2021-1212,CVE-2021-1213,CVE-2021-1214,CVE-2021-1215,CVE-2021-1216,CVE-2021-1217,CVE-2021-1307,CVE-2021-1360
Categories: Security Alerts

Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Command Injection Vulnerabilities

Cisco Security Advisories - Wed, 2021-01-13 16:00

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges.

The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on an affected device.

Cisco has not released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-LBdQ2KRN


Security Impact Rating: High
CVE: CVE-2021-1146,CVE-2021-1147,CVE-2021-1148,CVE-2021-1149,CVE-2021-1150
Categories: Security Alerts

Cisco Proximity Desktop for Windows DLL Hijacking Vulnerability

Cisco Security Advisories - Wed, 2021-01-13 16:00

A vulnerability in the loading process of specific DLLs in Cisco Proximity Desktop for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker must have valid credentials on the Windows system.

This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user’s account.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-proximity-dll-UvW4VHPM


Security Impact Rating: Medium
CVE: CVE-2021-1240
Categories: Security Alerts

Pages

Subscribe to Willing Minds aggregator - Security Alerts