Search results for:
cisco
CVE/vulnerability
Cisco Warns of Meeting Management API Privilege Escalation Vulnerability
Cisco has issued a critical advisory regarding a privilege escalation vulnerability in its Meeting Management REST API.
The flaw tracked as CVE-2025-20156, allows a remote, authenticated...
Cyber Security News
Cisco NX-OS Vulnerability Allows Attackers to Bypass Image Signature Verification
A critical vulnerability has been identified in the bootloader of Cisco NX-OS Software, potentially allowing attackers to bypass image signature verification.
This flaw, which affects...
CVE/vulnerability
Cisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive Information
A significant vulnerability (CVE-2024-20445) has been discovered in Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 that...
Cisco
Cisco Flaw Let Attackers Run Command as Root User
A critical vulnerability has been discovered in Cisco Unified Industrial Wireless Software, which affects Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points.
This flaw tracked...
Cyber Security News
Cisco ASA Devices Vulnerable to SSH Remote Command Injection Flaw
Cisco has issued a critical security advisory regarding a vulnerability in its Adaptive Security Appliance (ASA) Software. The vulnerability could allow remote attackers to...
Cisco
Cisco ATA 190 Telephone Adapter Vulnerabilities Let Attackers Execute Remote Code
Cisco has disclosed multiple vulnerabilities affecting its ATA 190 Series Analog Telephone Adapter firmware, posing significant user risks.
These vulnerabilities could allow remote attackers...
Cisco
Hackers Allegedly Selling Data Stolen from Cisco
A group of hackers reportedly sells sensitive data stolen from Cisco Systems, Inc.
The breach, allegedly carried out by a collective known as IntelBroker...
Cisco
Cisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systems
A critical vulnerability has been discovered in Cisco's Nexus Dashboard Fabric Controller (NDFC), potentially allowing hackers to execute arbitrary commands on affected systems.
This...