Monday, April 28, 2025
HomeComputer SecurityCisco Released Security Updates for Multiple Vulnerabilities that Affected Cisco Products

Cisco Released Security Updates for Multiple Vulnerabilities that Affected Cisco Products

Published on

SIEM as a Service

Follow Us on Google News

Cisco security updates released for multiple vulnerabilities that discovered form its products that include dangerous Remote Code Execution Vulnerability in Apache Struts .

Security update includes a remote attacker could exploit one of these vulnerabilities to take control of an affected system.

Cisco addressed 5 new vulnerabilities which categorized under Critical, High and Medium.

- Advertisement - Google News

1. Apache Struts Remote Code Execution Vulnerability 

A critical remote code execution vulnerability that discovered in Apache Struts leads an attack to perform an unauthenticated and execute arbitrary code on a targeted system.

an attacker could exploit this vulnerability by sending a request that submits malicious input to the affected application for processing.

Finally, attackers could execute arbitrary code on the target system and control victims machine.

You can see here the Affected products by Apache Struts remote code execution vulnerability

2.Linux Kernel IP Denial of Service Vulnerability

A vulnerability is known as Linux Kernel IP Fragment Reassembly Denial of Service

The vulnerability could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

An attack could be executed by an attacker who can submit a stream of fragmented IPv4 or IPv6 packets that are designed to trigger the issue on an affected device.

3.FreeBSD Kernels TCP Reassembly Denial of Service

An attack could be executed by using low transfer rates of TCP packets, unlike the typically distributed denial of service (DDoS) attacks.

This attack causes the remote attacker to cause a denial of service (DoS) condition on an affected device.

Due to inefficient TCP reassembly algorithms in the TCP stacks that are used by the affected kernels.

Linux Kernel Versions 4.9 and other supported version are affected by this vulnerability.

4. Cisco Data Center Network Manager Path Traversal Vulnerability

A directory traversal vulnerability that discovered in  Cisco Data Center Network Manager Path allows attackers gain access to sensitive files on the targeted system.

This vulnerability affected due to improper validation of user requests within the management interface which allow attacker sending a malicious request containing directory traversal character sequences within the management interface.

Also, the attacker can create arbitrary files on the targeted system. Cisco released software updates that address this vulnerability.

5.CPU Side-Channel Information Disclosure Vulnerabilities

According to the Cisco security updates, three vulnerabilities were disclosed by Intel and security researchers that leverage a speculative execution side-channel method referred to as L1 Terminal Fault (L1TF) that affects modern Intel microprocessors.

“These vulnerabilities could allow an unprivileged, local attacker, in specific circumstances, to read privileged memory belonging to other processes.”

  • The first vulnerability, CVE-2018-3615, affects Intel SGX technology and is referred to by the researchers who discovered it as foreshadow. 
  • The second vulnerability, CVE-2018-3620, and the third vulnerability, CVE-2018-3646, are referred to as L1 Terminal Fault attacks by Intel

Also Read

Oracle Releases Critical Patch Update that Covers 334 Vulnerabilities Across All the Products

Debian 9.5 Released With Fix for Spectre v2 and Other Security Issues

Cisco Released Security Updates and Fixed Critical Vulnerabilities that Affected Cisco Products

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...