Cisco released a security update to address multiple vulnerabilities that reside in Cisco utilities includes a remote code execution flaw that affected Cisco Industrial Network Director.
This new Cisco security updates release with the fixes for 9 vulnerabilities, in which, two vulnerabilities marked as high severity and rest of the 7 vulnerabilities are categorized under medium severity.
Remote code execution resides in software update feature of Cisco Industrial Network Director let remote attacker authenticate the system remotely to execute the arbitrary code and take full control of the vulnerable system.
“The vulnerability ( CVE-2019-1861) is due to improper validation of files uploaded to the affected application. An attacker could exploit this vulnerability by authenticating to the affected system”
Cisco fixed this vulnerability in its new software releases 1.6.0 for Cisco Industrial Network Director.
Another high severity vulnerability ( CVE-2019-1845) that affected Cisco Unified Communications Manager IM&P Service, Cisco TelePresence VCS, and Cisco Expressway let attackers perform Denial of Service.
According to Cisco, This vulnerability affects the Cisco following products if users are running a vulnerable release:
Cisco Industrial Network Director Remote Code Execution Vulnerability | High | CVE-2019-1861 |
Cisco Unified Communications Manager IM&P Service, Cisco TelePresence VCS, and Cisco Expressway Series Denial of Service Vulnerability | High | CVE-2019-1845 |
Cisco Webex Meetings Server Information Disclosure Vulnerability | Medium | CVE-2019-1868 |
Cisco TelePresence Video Communication Server and Cisco Expressway Series Server-Side Request Forgery Vulnerability | Medium | CVE-2019-1872 |
Cisco Unified Computing System BIOS Signature Bypass Vulnerability | Medium | CVE-2019-1880 |
Cisco IOS XR Software Secure Shell Authentication Vulnerability | Medium | CVE-2019-1842 |
Cisco Industrial Network Director Stored Cross-Site Scripting Vulnerability | Medium | CVE-2019-1882 |
Cisco Industrial Network Director Cross-Site Request Forgery Vulnerability | Medium | CVE-2019-1881 |
Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability | Medium | CVE-2019-1870 |
Cisco advised affected users to apply these patches immediately to keep the network safe and secure.
The patches can be deployed through Patch Manager plus, where you can pre-built, tested, ready-to-deploy packages for your Enterprise network.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates, also you can take the Best Cybersecurity courses online to keep yourself updated.
Also Read:
Cisco Fixed Routers Vulnerabilities that Allows Hackers to Run Remote Code with Root Access
The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…
White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…
Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…
The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…
Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…
WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…