Cisco released a security update to address multiple vulnerabilities that reside in Cisco utilities includes a remote code execution flaw that affected Cisco Industrial Network Director.
This new Cisco security updates release with the fixes for 9 vulnerabilities, in which, two vulnerabilities marked as high severity and rest of the 7 vulnerabilities are categorized under medium severity.
Remote code execution resides in software update feature of Cisco Industrial Network Director let remote attacker authenticate the system remotely to execute the arbitrary code and take full control of the vulnerable system.
“The vulnerability ( CVE-2019-1861) is due to improper validation of files uploaded to the affected application. An attacker could exploit this vulnerability by authenticating to the affected system”
Cisco fixed this vulnerability in its new software releases 1.6.0 for Cisco Industrial Network Director.
Another high severity vulnerability ( CVE-2019-1845) that affected Cisco Unified Communications Manager IM&P Service, Cisco TelePresence VCS, and Cisco Expressway let attackers perform Denial of Service.
According to Cisco, This vulnerability affects the Cisco following products if users are running a vulnerable release:
Cisco Industrial Network Director Remote Code Execution Vulnerability | High | CVE-2019-1861 |
Cisco Unified Communications Manager IM&P Service, Cisco TelePresence VCS, and Cisco Expressway Series Denial of Service Vulnerability | High | CVE-2019-1845 |
Cisco Webex Meetings Server Information Disclosure Vulnerability | Medium | CVE-2019-1868 |
Cisco TelePresence Video Communication Server and Cisco Expressway Series Server-Side Request Forgery Vulnerability | Medium | CVE-2019-1872 |
Cisco Unified Computing System BIOS Signature Bypass Vulnerability | Medium | CVE-2019-1880 |
Cisco IOS XR Software Secure Shell Authentication Vulnerability | Medium | CVE-2019-1842 |
Cisco Industrial Network Director Stored Cross-Site Scripting Vulnerability | Medium | CVE-2019-1882 |
Cisco Industrial Network Director Cross-Site Request Forgery Vulnerability | Medium | CVE-2019-1881 |
Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability | Medium | CVE-2019-1870 |
Cisco advised affected users to apply these patches immediately to keep the network safe and secure.
The patches can be deployed through Patch Manager plus, where you can pre-built, tested, ready-to-deploy packages for your Enterprise network.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates, also you can take the Best Cybersecurity courses online to keep yourself updated.
Also Read:
Cisco Fixed Routers Vulnerabilities that Allows Hackers to Run Remote Code with Root Access
Gunra Ransomware, has surfaced as a formidable threat in April 2025, targeting Windows systems across…
Cybersecurity firm Sansec has uncovered a sophisticated supply chain attack that has compromised 21 popular…
The financially motivated threat group Venom Spider, also tracked as TA4557, has shifted its focus…
The Russian-based threat group RomCom, also known as Storm-0978, Tropical Scorpius, and Void Rabisu, has…
The Seqrite Labs APT team has uncovered a sophisticated cyber campaign by the Pakistan-linked Transparent…
The LUMMAC.V2 infostealer malware, also known as Lumma or Lummastealer, has emerged as a significant…