Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93098 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

Cisco advisories/updates


  • Please log in to reply
332 replies to this topic

#136 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 25 September 2013 - 02:01 PM

FYI...

Cisco IOS Software Security Advisory Bundle - Semiannual
- http://www.cisco.com..._ERP_sep13.html
Sep 25, 2013 - "Cisco released its semiannual Cisco IOS Software Security Advisory Bundled Publication on September 25, 2013... Cisco releases bundles of Cisco IOS Software Security Advisories on the fourth Wednesday of the month in March and September of each calendar year. The publication includes eight Security Advisories that all address vulnerabilities in Cisco IOS Software. Exploits of the individual vulnerabilities could result in a denial of service (DoS) condition, interface queue wedge, or a device reload. Use the Cisco IOS Software Checker* to quickly determine whether a given Cisco IOS Software release is exposed to Cisco product vulnerabilities..."
* http://tools.cisco.c...ectIOSVersion.x
___

Cisco IOS Software Multicast Network Time Protocol DoS Vulnerability
- http://tools.cisco.c...sa-20130925-ntp
Cisco IOS Software Internet Key Exchange Memory Leak Vulnerability
- http://tools.cisco.c...sa-20130925-ike
Cisco IOS Software IPv6 Virtual Fragmentation Reassembly DoS Vulnerability
- http://tools.cisco.c...0130925-ipv6vfr
Cisco IOS Software DHCP DoS Vulnerability
- http://tools.cisco.c...a-20130925-dhcp
Cisco IOS Software Zone-Based Firewall and Content Filtering Vulnerability
- http://tools.cisco.c...sa-20130925-cce
Cisco IOS Software Queue Wedge DoS Vulnerability
- http://tools.cisco.c...-20130925-wedge
Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge Vulnerability
- http://tools.cisco.c...a-20130925-rsvp
Cisco IOS Software Network Address Translation Vulnerabilities
- http://tools.cisco.c...sa-20130925-nat

- http://www.securityt....com/id/1029087
CVE Reference: CVE-2013-5472, CVE-2013-5473, CVE-2013-5474, CVE-2013-5475, CVE-2013-5476, CVE-2013-5477, CVE-2013-5478, CVE-2013-5479, CVE-2013-5480, CVE-2013-5481
Sep 25 2013
Impact: Denial of service via network
Fix Available: Yes Vendor Confirmed: Yes ...

:ph34r:

Edited by AplusWebMaster, 25 September 2013 - 09:19 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#137 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 02 October 2013 - 05:29 PM

FYI...

- http://tools.cisco.c...cationListing.x

Cisco IOS XR Software Memory Exhaustion Vulnerability
- http://tools.cisco.c...-20131002-iosxr
2013 October 2 - "Summary: Cisco IOS XR Software version 4.3.1 contains a vulnerability that could result in complete packet memory exhaustion. Successful exploitation could render critical services on the affected device unable to allocate packets resulting in a denial of service (DoS) condition. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available..."

- http://www.securityt....com/id/1029123
CVE Reference: https://web.nvd.nist...d=CVE-2013-5503 - 7.8 (HIGH)
Oct 2 2013
Impact: Denial of service via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): XR 4.3.1 ...
Solution: The vendor has issued a fix (XR 4.3.2)...

:ph34r:

Edited by AplusWebMaster, 04 October 2013 - 01:58 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#138 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 10 October 2013 - 09:37 AM

FYI...

- http://tools.cisco.c...cationListing.x

Cisco Firewall Services - Multiple Vulnerabilities
- http://tools.cisco.c...a-20131009-fwsm
2013 Oct 9 - "Summary: Cisco Firewall Services Module (FWSM) Software for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers is affected by the following vulnerabilities:
Cisco FWSM Command Authorization Vulnerability
SQL*Net Inspection Engine Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the other. Successful exploitation of the Cisco FWSM Command Authorization Vulnerability may result in a complete compromise of the confidentiality, integrity and availability of the affected system. Successful exploitation of the SQL*Net Inspection Engine Denial of Service Vulnerability may result in a reload of an affected device, leading to a denial of service (DoS) condition. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available..."
- http://www.securityt....com/id/1029163
CVE Reference: CVE-2013-5506, CVE-2013-5508
Oct 9 2013
Impact: Denial of service via network, Disclosure of system information, Modification of system information
Fix Available: Yes Vendor Confirmed: Yes
Version(s): prior to versions 3.2(27), 4.1(14)...
Solution: The vendor has issued a fix (3.2(27), 4.1(14))...

Cisco ASA Software - Multiple Vulnerabilities
- http://tools.cisco.c...sa-20131009-asa
Last Updated 2013 Oct 10 - Revision 1.1 - "Summary: Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:
IPsec VPN Crafted ICMP Packet Denial of Service Vulnerability
SQL*Net Inspection Engine Denial of Service Vulnerability
Digital Certificate Authentication Bypass Vulnerability
Remote Access VPN Authentication Bypass Vulnerability
Digital Certificate HTTP Authentication Bypass Vulnerability
HTTP Deep Packet Inspection Denial of Service Vulnerability
DNS Inspection Denial of Service Vulnerability
AnyConnect SSL VPN Memory Exhaustion Denial of Service Vulnerability
Clientless SSL VPN Denial of Service Vulnerability ...
Cisco has released free software updates that address these vulnerabilities. Workarounds are available for some of the vulnerabilities..."
Revision 2.2 - 2013-Dec-13 - Corrected some information about the SSL VPN Web Portal Denial of Service Vulnerability - CSCua22709
- http://www.securityt....com/id/1029162
CVE Reference: CVE-2013-3415, CVE-2013-5507, CVE-2013-5508, CVE-2013-5509, CVE-2013-5510, CVE-2013-5511, CVE-2013-5512, CVE-2013-5513, CVE-2013-5515
Oct 9 2013
Impact: Denial of service via network, Host/resource access via network, User access via network
Fix Available: Yes Vendor Confirmed: Yes ...
Cisco ASA 5510, Cisco ASA 5520, Cisco ASA 5540, and Cisco ASA 5550 are not affected...
Solution: The vendor has issued a fix (7.2(5.12), 8.2(5.46), 8.3(2.39), 8.4(7), 8.5(1.18), 8.6(1.12), 8.7(1.7), 9.0(3.6), 9.1(2.8))...

:ph34r: :ph34r:


Edited by AplusWebMaster, 17 December 2013 - 10:10 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#139 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 23 October 2013 - 02:18 PM

FYI...

- http://tools.cisco.c...cationListing.x

Cisco IOS XR Software Route Processor DoS vuln
- http://tools.cisco.c...-20131023-iosxr
2013 Oct 23 - "Summary: Cisco IOS XR Software Releases 3.3.0 to 4.2.0 contain a vulnerability when handling fragmented packets that could result in a denial of service (DoS) condition of the Cisco CRS Route Processor cards listed in the "Affected Products" section of this advisory... Customers that are running version 4.2.1 or later of Cisco IOS XR Software, or that have previously installed the Software Maintenance Upgrades (SMU) for Cisco bug ID CSCtz62593 are not affected by this vulnerability. Cisco has released free software updates that address this vulnerability..."
- https://secunia.com/advisories/55468/
Release Date: 2013-10-24
Criticality: Less Critical
Where: From local network
Impact: DoS
Operating System: Cisco IOS XR 3.x, 4.x
CVE Reference: https://web.nvd.nist...d=CVE-2013-5549 - 7.1 (HIGH)
... vulnerability is reported in versions 3.8.1 through 4.2.0....
Solution: Apply update...
Original Advisory: Cisco (CSCuh30380):
http://tools.cisco.c...-20131023-iosxr
http://tools.cisco.c...x?alertId=31369

Multiple Cisco Products - Apache Struts 2 Command Execution vuln
- http://tools.cisco.c...0131023-struts2
2013 Oct 23 - "Summary: Multiple Cisco products include an implementation of the Apache Struts 2 component that is affected by a remote command execution vulnerability... Cisco has released free software updates that address this vulnerability for all the affected products -except- Cisco Business Edition 3000. Cisco Business Edition 3000 should contact their Cisco representative for available options. Workarounds that mitigate this vulnerability are not available..."
- https://secunia.com/advisories/55467/
Release Date: 2013-10-24
Criticality: Moderately Critical
Where: From local network
Impact: Security Bypass
Operating System: Cisco Unified SIP Proxy (USP)
CVE Reference: https://web.nvd.nist...d=CVE-2013-2251 - 9.3 (HIGH)
... vulnerability is reported in versions prior to 8.5(5).
Solution: Update to version 8.5(5).
Original Advisory: Cisco (CSCui40582):
http://tools.cisco.c...0131023-struts2

Cisco Identity Services Engine - Multiple vulns
- http://tools.cisco.c...sa-20131023-ise
2013 Oct 23 - "Summary: Cisco Identity Services Engine (ISE) contains the following vulnerabilities:
Cisco ISE Authenticated Arbitrary Command Execution Vulnerability
Cisco ISE Support Information Download Authentication Bypass Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the other... Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are not available..."
- https://secunia.com/advisories/55469/
Release Date: 2013-10-24
Criticality: Moderately Critical
Where: From local network
Impact:Security Bypass, System access
Operating System: Cisco Identity Services Engine (ISE) 1.x
CVE Reference(s):
- https://web.nvd.nist...d=CVE-2013-2251 - 9.3 (HIGH)
- https://web.nvd.nist...d=CVE-2013-5530 - 9.0 (HIGH)
- https://web.nvd.nist...d=CVE-2013-5531 - 5.0
Solution: Apply patch....
Original Advisory: Cisco (CSCty20405, CSCuh81511, CSCui22841):
http://tools.cisco.c...0131023-struts2
http://tools.cisco.c...sa-20131023-ise
http://tools.cisco.c...x?alertId=31294
http://tools.cisco.c...x?alertId=31295

:ph34r: :ph34r: :ph34r:

Edited by AplusWebMaster, 25 October 2013 - 01:19 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#140 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 30 October 2013 - 02:43 PM

FYI...

- http://tools.cisco.c...cationListing.x

Cisco IOS XE Software for 1000 Series Aggregation Services Routers - multiple vulns
- http://tools.cisco.c...0131030-asr1000
2013 Oct 30 - "Summary: Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) contains the following denial of service (DoS) vulnerabilities:
Cisco IOS XE Software Malformed ICMP Packet Denial of Service Vulnerability
Cisco IOS XE Software PPTP Traffic Denial of Service Vulnerability
Cisco IOS XE Software TCP Segment Reassembly Denial of Service Vulnerability
Cisco IOS XE Software Malformed EoGRE Packet Denial of Service Vulnerability
These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others. Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the embedded services processors (ESP) card or the route processor (RP) card, causing an interruption of services. Repeated exploitation could result in a sustained DoS condition.
Note: Cisco IOS Software and Cisco IOS-XR Software are not affected by these vulnerabilities.
Cisco has released free software updates that address these vulnerabilities..."
- http://www.securityt....com/id/1029277
CVE Reference: CVE-2013-5543, CVE-2013-5545, CVE-2013-5546, CVE-2013-5547
Oct 30 2013
Impact: Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): IOS XE for 1000 Series ASR; 3.4.x, 3.5.x, 3.7.x, 3.8.x, 3.9.x ...
Solution: The vendor has issued a fix (3.4.2S, 3.5.1S, 3.7.3S, 3.8.1S, 3.9.2S)...

Posted Image


Edited by AplusWebMaster, 31 October 2013 - 04:02 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#141 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 07 November 2013 - 02:58 PM

FYI...

- http://tools.cisco.c...cationListing.x

Cisco WAAS Mobile Remote Code Execution vuln
- http://tools.cisco.c...-20131106-waasm
2013 Nov 6 - "Summary: Cisco Wide Area Application Services (WAAS) Mobile contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the Cisco WAAS Mobile server with the privileges of the Microsoft Internet Information Services (IIS) web server. Cisco has released free software updates that address this vulnerability..."
- http://www.securityt....com/id/1029309
CVE Reference: CVE-2013-5554
Nov 6 2013
Impact: Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 3.5.5...
Solution: The vendor has issued a fix (3.5.5)...

Cisco TelePresence VX Clinical Assistant Administrative Password Reset vuln
- http://tools.cisco.c...-20131106-tvxca
2013 Nov 6 - "Summary: A vulnerability in the WIL-A module of Cisco TelePresence VX Clinical Assistant could allow an unauthenticated, remote attacker to log in as the admin user of the device using a blank password. The vulnerability is due to a coding error that resets the password for the admin user to a blank password on every reboot. An attacker could exploit this vulnerability by logging in to the administrative interface as the admin user with a blank password. Cisco has released free software updates that address this vulnerability..."
- http://www.securityt....com/id/1029307
CVE Reference: CVE-2013-5558
Nov 6 2013
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): VX Clinical Assistant version 1.2 only ...
Solution: The vendor has issued a fix (TelePresence VX Clinical Assistant software version 1.21)...

Cisco IOS Software Session Initiation Protocol DoS vuln
- http://tools.cisco.c...sa-20131106-sip
2013 Nov 6 - "Summary: A vulnerability exists in the Session Initiation Protocol (SIP) implementation in Cisco IOS Software that could allow an unauthenticated, remote attacker to cause a reload of an affected device or cause memory leaks that may result in system instabilities. To exploit this vulnerability, affected devices must be configured to process SIP messages. Limited Cisco IOS Software releases are affected. Cisco has released free software updates that address this vulnerability. There are no workarounds for devices that must run SIP; however, mitigations are available to limit exposure to the vulnerability..."
Rev 1.1 2013-Nov-15 Minor changes to wording of "Disabling SIP Listening Ports" section in Workarounds.
- http://www.securityt....com/id/1029308
CVE Reference: CVE-2013-5553
Nov 6 2013
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 15.1GC ...
Solution: The vendor has issued a fix (15.1M, 15.1(4)M7)...
 

:ph34r: :ph34r: :ph34r:


Edited by AplusWebMaster, 18 November 2013 - 10:39 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#142 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 10 January 2014 - 03:32 PM

FYI...

- http://tools.cisco.c...cationListing.x

Cisco Small Business Devices - Undocumented Test Interface
- http://tools.cisco.c...sa-20140110-sbd
Jan 10, 2014 - "Summary: A vulnerability in the Cisco WAP4410N Wireless-N Access Point, Cisco WRVS4400N Wireless-N Gigabit Security Router, and the Cisco RVS4000 4-port Gigabit Security Router could allow an unauthenticated, remote attacker to gain root-level access to an affected device. Cisco will release free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are not available... The following products are affected by the vulnerabilities that are described in this advisory:
• Cisco RVS4000 4-port Gigabit Security Router running firmware version 2.0.3.2 and prior
• Cisco WRVS4400N Wireless-N Gigabit Security Router hardware version 1.0 and 1.1 running firmware version 1.1.13 and prior
• Cisco WRVS4400N Wireless-N Gigabit Security Router hardware version 2.0 running firmware version 2.0.2.1 and prior
• Cisco WAP4410N Wireless-N Access Point running firmware version 2.0.6.1 and prior..."
Rev 1.3 - 2014-Jan-28 - Added fixed software version information. Added Cisco Small Business Support Center contact information.

- https://web.nvd.nist...d=CVE-2014-0659 - 10.0 (HIGH)
Last revised: 01/13/2014
 

:ph34r:


Edited by AplusWebMaster, 13 February 2014 - 05:38 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#143 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 15 January 2014 - 08:38 PM

FYI...

- http://tools.cisco.c...cationListing.x

Cisco Secure Access Control System - multiple vulns
- http://tools.cisco.c...-20140115-csacs
2014 Jan 15 - "Summary: Cisco Secure Access Control System (ACS) is affected by the following vulnerabilities:
• Cisco Secure ACS RMI Privilege Escalation Vulernability
• Cisco Secure ACS RMI Unauthenticated User Access Vulnerability
• Cisco Secure ACS Operating System Command Injection Vulnerability
Cisco Secure ACS uses the Remote Method Invocation (RMI) interface for internode communication using TCP ports 2020 and 2030. These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the other. Cisco has released free software updates that address these vulnerabilities...
Affected Products/ Vulnerable Products: All releases of Cisco Secure ACS -prior- to release 5.5 are affected by the RMI-based vulnerabilities in this advisory. All releases of Cisco Secure ACS -prior- to ACS 5.4 patch 3 are affected by the OS command injection vulnerability in this advisory..."
(More detail at the cisco URL above.)
 

:ph34r: :ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#144 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 22 January 2014 - 04:37 PM

FYI...

- http://tools.cisco.c...cationListing.x

Cisco TelePresence Video Communication Server SIP DoS vuln
- http://tools.cisco.c...sa-20140122-vcs
2014 Jan 22 - "Summary: Cisco TelePresence Video Communication Server (VCS) contains a vulnerability that could allow an unauthenticated, remote attacker to trigger the failure of several critical processes which may cause active call to be dropped and prevent users from making new calls until the affected system is reloaded. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available..."
- http://www.securityt....com/id/1029655
- https://web.nvd.nist...d=CVE-2014-0662 - 7.1 (HIGH)
Jan 22 2014

Cisco TelePresence System Software Command Execution vuln
- http://tools.cisco.c...sa-20140122-cts
2014 Jan 22 - "Summary: Cisco TelePresence System Software contains a vulnerability in the System Status Collection Daemon (SSCD) code that could allow an unauthenticated, adjacent attacker to execute arbitrary commands with the privileges of the root user. Cisco has released free software updates that address this vulnerability. No workarounds that mitigate this vulnerability are available..."
- http://www.securityt....com/id/1029656
- https://web.nvd.nist...d=CVE-2014-0661 - 8.3 (HIGH)
Jan 22 2014

Cisco TelePresence ISDN Gateway D-Channel DoS vuln
- http://tools.cisco.c...20140122-isdngw
2014 Jan 22 - "Summary: Cisco TelePresence ISDN Gateway contains a vulnerability that could allow an unauthenticated, remote attacker to trigger the drop of the data channel (D-channel), causing all calls to be terminated and preventing users from making new calls. Cisco has released free software updates that address this vulnerability. No workarounds that mitigate this vulnerability are available..."
- http://www.securityt....com/id/1029657
- https://web.nvd.nist...d=CVE-2014-0660 - 7.1 (HIGH)
Jan 22 2014
 

:ph34r: :ph34r: :ph34r:


Edited by AplusWebMaster, 23 January 2014 - 01:38 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#145 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 20 February 2014 - 10:35 AM

FYI...

- http://tools.cisco.c...cationListing.x

Unauthorized Access Vulnerability in Cisco Unified SIP Phone 3905
- http://tools.cisco.c...-20140219-phone
2014 Feb 19
Summary: A vulnerability in the Cisco Unified SIP Phone 3905 could allow an unauthenticated, remote attacker to gain root-level access to an affected device. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available...
- http://www.securityt....com/id/1029789
CVE Reference: CVE-2014-0721
Feb 20 2014
Impact: Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes...
Solution: The vendor has issued a fix (Phone 3905 Firmware Release 9.4(1))...

Cisco UCS Director Default Credentials vuln
- http://tools.cisco.c...a-20140219-ucsd
2014 Feb 19
Summary: A vulnerability in Cisco Unified Computing System (UCS) Director could allow an unauthenticated, remote attacker to take complete control of the affected device. The vulnerability is due to a default root user account created during installation. An attacker could exploit this vulnerability by accessing the server command-line interface (CLI) remotely using the default account credentials. An exploit could allow the attacker to log in with the default credentials, which provide full administrative rights to the system. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available...
- http://www.securityt....com/id/1029788
CVE Reference: CVE-2014-0709
Feb 20 2014
Impact: User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes...  
Version(s): Prior to Director 4.0.0.3 HOTFIX...

Multiple Vulnerabilities in Cisco IPS Software
- http://tools.cisco.c...sa-20140219-ips
2014 Feb 19
Summary: Cisco Intrusion Prevention System (IPS) Software is affected by the following vulnerabilities:
    Cisco IPS Analysis Engine Denial of Service Vulnerability
    Cisco IPS Control-Plane MainApp Denial of Service Vulnerability
    Cisco IPS Jumbo Frame Denial of Service Vulnerability
The Cisco IPS Analysis Engine Denial of Service Vulnerability and the Cisco IPS Jumbo Frame Denial of Service Vulnerability could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or crash. When this occurs, the Cisco IPS will stop inspecting traffic. The Cisco IPS Control-Plane MainApp Denial of Service Vulnerability could allow an unauthenticated, remote attacker to cause the MainApp process to become unresponsive and prevent it from executing several tasks including alert notification, event store management, and sensor authentication. The Cisco IPS web server will also be unavailable while the MainApp process is unresponsive, and other processes such as the Analysis Engine process may not work properly.Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate some of the vulnerabilities are available...
- http://www.securityt....com/id/1029787
Feb 20 2014
Impact: Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.x, 7.0, 7.1, 7.2 ...
Solution: The vendor has issued a fix (7.1(8p2)E4, 7.2(2)E4)...

Cisco Firewall Services Module Cut-Through Proxy DoS vuln
- http://tools.cisco.c...a-20140219-fwsm
2014 Feb 19
Summary: Cisco Firewall Services Module (FWSM) Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected system. The vulnerability is due to a race condition when releasing the memory allocated by the cut-through proxy function. An attacker could exploit this vulnerability by sending traffic to match the condition that triggers cut-through proxy authentication. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate the vulnerability are not available...
- http://www.securityt....com/id/1029784
CVE Reference: CVE-2014-0710
Feb 19 2014
Fix Available:  Yes  Vendor Confirmed:  Yes ...  
Impact: A remote user can cause the target device to reload.
Solution: The vendor has issued a fix (3.2(28), 4.1(15))...
 

xph34r.png.pagespeed.ic.GOH20nhrx_.pngxph34r.png.pagespeed.ic.GOH20nhrx_.png


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#146 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 26 February 2014 - 04:13 PM

FYI...

- http://tools.cisco.c...cationListing.x

Cisco Prime Infrastructure Command Execution vuln
- http://tools.cisco.c...-sa-20140226-pi
2014 Feb 26 - "Summary: A vulnerability in Cisco Prime Infrastructure could allow an authenticated, remote attacker to execute arbitrary commands with root-level privileges. The vulnerability is due to improper validation of URL requests. An attacker could exploit this vulnerability by requesting an unauthorized command via a specific URL. Successful exploitation could allow an authenticated attacker to execute system commands with root-level privileges. Cisco has released free software updates that address this vulnerability. A software patch that addresses this vulnerability in all affected versions is also available. Workarounds that mitigate this vulnerability are not available..."
- http://www.securityt....com/id/1029832
CVE Reference: https://web.nvd.nist...d=CVE-2014-0679 - 9.0
Feb 26 2014
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.2, 1.3, 1.4, 2.0 ...
Impact: A remote authenticated user can execute arbitrary commands on the target system with root privileges.
Solution: The vendor has issued a fix (1.3.0.20-2, 1.4.0.45-2, 2.0.0.0.294-2)...
 

xph34r.png.pagespeed.ic.GOH20nhrx_.png


Edited by AplusWebMaster, 28 February 2014 - 11:31 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#147 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 06 March 2014 - 04:50 AM

FYI...

- http://tools.cisco.c...cationListing.x

Cisco Wireless LAN Controllers - multiple vulns
- http://tools.cisco.c...sa-20140305-wlc
2014 March 5 - "Summary: The Cisco Wireless LAN Controller (WLC) product family is affected by the following vulnerabilities:
    Cisco Wireless LAN Controller Denial of Service Vulnerability
    Cisco Wireless LAN Controller Unauthorized Access to Associated Access Points Vulnerability
    Cisco Wireless LAN Controller IGMP Version 3 Denial of Service Vulnerability
    Cisco Wireless LAN Controller MLDv2 Denial of Service Vulnerability
    Cisco Wireless LAN Controller Crafted Frame Denial of Service Vulnerability
    Cisco Wireless LAN Controller Crafted Frame Denial of Service Vulnerability
Cisco has released free software updates that address these vulnerabilities..."
- http://www.securityt....com/id/1029865
CVE Reference: CVE-2014-0701, CVE-2014-0703, CVE-2014-0704, CVE-2014-0705, CVE-2014-0706, CVE-2014-0707
Mar 5 2014
Impact: Denial of service via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes ...
Solution: The vendor has issued a fix (7.0.250.0, 7.4.121.0, 7.6.100.0)...
___

Cisco Small Business Router Password Disclosure Vuln
- http://tools.cisco.c...sa-20140305-rpd
2014 March 5 - "Summary: A vulnerability in the web management interface of the Cisco RV110W Wireless-N VPN Firewall, the Cisco RV215W Wireless-N VPN Router, and the Cisco CVR100W Wireless-N VPN Router could allow an unauthenticated, remote attacker to gain administrative-level access to the web management interface of the affected device. The vulnerability is due to improper handling of authentication requests by the web framework. An attacker could exploit this vulnerability by intercepting, modifying and resubmitting an authentication request. Successful exploitation of this vulnerability could give an attacker administrative-level access to the web-based administration interface on the affected device. Cisco has released free software updates that address this vulnerability.There are currently no known workarounds that mitigate this vulnerability..."
- http://www.securityt....com/id/1029866
CVE Reference: CVE-2014-0683
Mar 5 2014
Impact: Disclosure of authentication information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): RV110W, RV215W, CVR100W ...
Solution: The vendor has issued a fix.
Cisco CVR100W firmware version 1.0.1.21
Cisco RV110W firmware version 1.2.0.10
Cisco RV215W firmware version 1.1.0.6 ...
 

xph34r.png.pagespeed.ic.GOH20nhrx_.pngxph34r.png.pagespeed.ic.GOH20nhrx_.png


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#148 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 20 March 2014 - 09:31 PM

FYI...

- http://tools.cisco.c...cationListing.x

Cisco AsyncOS Software Code Execution vuln
- http://tools.cisco.c...0140319-asyncos
2014 March 19 - "Summary: Cisco AsyncOS Software for Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) contain a vulnerability that could allow an authenticated remote attacker to execute arbitrary code with the privileges of the root user. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available..."
- http://www.securityt....com/id/1029937
CVE Reference: https://web.nvd.nist...d=CVE-2014-2119 - 8.5 (HIGH)
Mar 19 2014
Impact: Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.1 and prior, 7.3, 7.5, 7.6, 7.8, 8.0 for ESA; 7.2 and prior, 7.7, 7.8, 7.9, 8.0, 8.1 for SMA...
Impact: A remote authenticated user can execute arbitrary code on the target system with root privileges.
Solution: The vendor has issued a fix (7.9.1-110, 8.1.1-013 for SMA; 7.6.3-023, 8.0.1-023 for ESA).
 

:ph34r:


Edited by AplusWebMaster, 21 March 2014 - 03:28 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#149 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 26 March 2014 - 02:59 PM

FYI...

Cisco IOS Software Security Advisory Bundled Publication - Semiannual
- http://www.cisco.com..._ERP_mar14.html
March 26, 2014 - "Cisco released its semiannual Cisco IOS Software Security Advisory Bundled Publication... In direct response to customer feedback, Cisco releases bundles of Cisco IOS Software Security Advisories on the fourth Wednesday of the month in March and September of each calendar year. The publication includes 5 Security Advisories that address vulnerabilities in Cisco IOS Software and 1 Security Advisory that addresses a vulnerability in the Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit Ethernet Uplinks. Exploits of the individual vulnerabilities could result in a denial of service (DoS) condition..."
(Links to individual advisories at the URL above.)
___

Cisco IOS SSL VPN HTTP Processing Flaw Lets Remote Users Deny Service
- http://www.securityt....com/id/1029962

Cisco IOS IPv6 Stack Bug Lets Remote Users Deny Service
- http://www.securityt....com/id/1029961

Cisco IOS Bugs in DNS ALG and TCP Input Module Let Remote Users Deny Service
- http://www.securityt....com/id/1029960

Cisco IOS IKEv2 Processing Flaw Lets Remote Users Deny Service
- http://www.securityt....com/id/1029959

Cisco 7600 Series Route Switch Processor 720 FPGA Bug Lets Remote Users Deny Service
- http://www.securityt....com/id/1029958

Cisco IOS SIP Processing Flaw Lets Remote Users Deny Service
- http://www.securityt....com/id/1029957
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 26 March 2014 - 04:19 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#150 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 10 April 2014 - 03:44 AM

FYI...

- http://tools.cisco.c...cationListing.x

OpenSSL Heartbeat Extension Vuln - Multiple Cisco Products
- http://tools.cisco.c...0409-heartbleed
Last Updated 2014 April 10 Rev 1.1 - "Summary: Multiple Cisco products incorporate a version of the OpenSSL package affected by a vulnerability that could allow an unauthenticated, remote attacker to retrieve memory in chunks of 64 kilobytes from a connected client or server. The vulnerability is due to a missing bounds check in the handling of the Transport Layer Security (TLS) heartbeat extension. An attacker could exploit this vulnerability by implementing a malicious TLS or Datagram Transport Layer Security (DTLS) client, if trying to exploit the vulnerability on an affected server, or a malicious TLS or DTLS server, if trying to exploit the vulnerability on an affected client. An exploit could send a specially crafted TLS or DTLS heartbeat packet to the connected client or server. An exploit could allow the attacker to disclose a limited portion of memory from a connected client or server for every heartbeat packet sent. The disclosed portions of memory could contain sensitive information that may include private keys and passwords. This advisory will be updated as additional information becomes available. Cisco will release free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities may be available..."
Also see: http://forums.whatth...394#entry846612

 

- http://blogs.cisco.c...nd-mitigations/
Apr 9, 2014
___

 

Cisco ASA Software - multiple vulns
- http://tools.cisco.c...sa-20140409-asa
Last Updated 2014 April 18 - "Summary: Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:
• Cisco ASA ASDM Privilege Escalation Vulnerability
• Cisco ASA SSL VPN Privilege Escalation Vulnerability
• Cisco ASA SSL VPN Authentication Bypass Vulnerability
• Cisco ASA SIP Denial of Service Vulnerability
These vulnerabilities are independent of one another; a release that is affected by one of the vulnerabilities may not be affected by the others... Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available for some of the vulnerabilities...
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 21 April 2014 - 12:07 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

Related Topics



2 user(s) are reading this topic

0 members, 2 guests, 0 anonymous users