Wednesday, February 26, 2025
HomeComputer SecurityCisco Released Security Updates & Fixed Several Vulnerabilities that Affected Cisco Products

Cisco Released Security Updates & Fixed Several Vulnerabilities that Affected Cisco Products

Published on

SIEM as a Service

Follow Us on Google News

Cisco security updates released and fixed 24 vulnerabilities that affected Cisco products to protect the customers from malicious hackers.

Cisco released patches for 24 vulnerabilities that affecting multiple products marked as 1 vulnerability as “critical”, 11 vulnerabilities as “Medium” and 12 vulnerabilities marked under “High” severity.

Critical Vulnerability affected vContainer of the Cisco SD-WAN Solution that allows remote attackers to gain access to the system that leads to denial of service (DoS) condition.

This Vulnerability could allow to execute the arbitrary code remotely and exploit the vulnerability as a root user.

High Severity vulnerabilities affected multiple Cisco products including Cisco SD-WAN Solution , Cisco Webex Network Recording Player , Cisco Identity Services Engine , Cisco IoT Field Network Director  , etc…

Multiple Cross site scripting vulnerabilities affected some of cisco products including Cisco SocialMiner , Cisco Webex , Cisco Prime Infrastructure ,
Cisco Firepower Management Center which is catogorised under Medium severity.

Multiple vulnerabilities in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system.

Another privilege escalation vulnerability affected Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to gain additional privileges on an affected device.

You can refer here the complete Cisco Security Advisories and Alerts here with the complete set of vulnerabilities information including the complete CVE details.

So far Cisco released security updates for 48 vulnerabilities in this year since jan 02 and Cisco requested Users to update their vulnerable system as soon as possible.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Oracle Released Biggest Security Updates – 284 Vulnerabilities are Fixed that Affected Oracle Products

Android Released First Security updates for 2019 & Fixed 13 vulnerabilities – Update Your Phone Now

Microsoft Released Security Updates that Fixed 51 Vulnerabilities that Affected its Products

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

Russian Government Proposes Stricter Penalties to Tackle Cybercrime

The Russian government has unveiled sweeping legislative reforms aimed at curbing cybercrime, introducing stricter...

Palo Alto Firewall Flaw Exploited in RA World Ransomware Attacks

A recent ransomware attack leveraging a vulnerability in Palo Alto Networks' PAN-OS firewall software...