Cisco released a security update to address multiple vulnerabilities that reside in Cisco utilities includes a remote code execution flaw that affected Cisco Industrial Network Director.
This new Cisco security updates release with the fixes for 9 vulnerabilities, in which, two vulnerabilities marked as high severity and rest of the 7 vulnerabilities are categorized under medium severity.
Remote code execution resides in software update feature of Cisco Industrial Network Director let remote attacker authenticate the system remotely to execute the arbitrary code and take full control of the vulnerable system.
“The vulnerability ( CVE-2019-1861) is due to improper validation of files uploaded to the affected application. An attacker could exploit this vulnerability by authenticating to the affected system”
Cisco fixed this vulnerability in its new software releases 1.6.0 for Cisco Industrial Network Director.
Another high severity vulnerability ( CVE-2019-1845) that affected Cisco Unified Communications Manager IM&P Service, Cisco TelePresence VCS, and Cisco Expressway let attackers perform Denial of Service.
According to Cisco, This vulnerability affects the Cisco following products if users are running a vulnerable release:
- Expressway Series configured for Mobile and Remote Access with IM&P Service (Releases X8.1 to X12.5.2)
- TelePresence VCS configured for Mobile and Remote Access with IM&P Service (Releases X8.1 to X12.5.2)
- Unified Communications Manager IM&P Service (multiple releases)
Fixed Vulnerabilities in This Cisco Security Updates
|Cisco Industrial Network Director Remote Code Execution Vulnerability||High||CVE-2019-1861|
|Cisco Unified Communications Manager IM&P Service, Cisco TelePresence VCS, and Cisco Expressway Series Denial of Service Vulnerability||High||CVE-2019-1845|
|Cisco Webex Meetings Server Information Disclosure Vulnerability||Medium||CVE-2019-1868|
|Cisco TelePresence Video Communication Server and Cisco Expressway Series Server-Side Request Forgery Vulnerability||Medium||CVE-2019-1872|
|Cisco Unified Computing System BIOS Signature Bypass Vulnerability||Medium||CVE-2019-1880|
|Cisco IOS XR Software Secure Shell Authentication Vulnerability||Medium||CVE-2019-1842|
|Cisco Industrial Network Director Stored Cross-Site Scripting Vulnerability||Medium||CVE-2019-1882|
|Cisco Industrial Network Director Cross-Site Request Forgery Vulnerability||Medium||CVE-2019-1881|
|Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability||Medium||CVE-2019-1870|
Cisco advised affected users to apply these patches immediately to keep the network safe and secure.
The patches can be deployed through Patch Manager plus, where you can pre-built, tested, ready-to-deploy packages for your Enterprise network.