Cisco fixes high-security flaws with IP Cameras, Webex Teams, and Identity Services Engine let attackers execute remotely on an affected device.
Along with this Cisco also fixes eleven medium-severity vulnerabilities in various Cisco devices.
The vulnerability resides with specific DLLs in the Cisco Webex Teams client for Windows allow an authenticated local attacker to load a malicious library.
The vulnerability is due to incorrect handling of directory paths at run time, Cisco fixed the vulnerability with 3.0.16269.0, and later, users are recommended to update with the fixed version.
The high-severity vulnerability can be tracked as CVE-2020-3544 and received a CVSS score of 7.8 out of 10.
Another high-severity security flaw resides with Cisco Discovery Protocol implementation for Cisco Video Surveillance 8000 Series IP Cameras could allow an unauthenticated, adjacent attacker to execute arbitrary code on an affected device or cause the device to reload.
An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device.
Successful exploitation allows attackers to execute code on the affected IP camera or cause it to reload unexpectedly, resulting in a denial of service (DoS).
Cisco fixed the vulnerability with 1.0.9-5 and later, users are recommended to update with a fixed version.
The vulnerability resides in the web-based management interface of the Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to modify parts of the configuration on an affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.
Also Read
Cisco Warns Hackers Actively Exploited Bug in Carrier-grade Routers
Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…
Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…
The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…
Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…
Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…
Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…