Cisco released a security update to address multiple vulnerabilities that reside in Cisco utilities includes a remote code execution flaw that affected Cisco Industrial Network Director.
This new Cisco security updates release with the fixes for 9 vulnerabilities, in which, two vulnerabilities marked as high severity and rest of the 7 vulnerabilities are categorized under medium severity.
Remote code execution resides in software update feature of Cisco Industrial Network Director let remote attacker authenticate the system remotely to execute the arbitrary code and take full control of the vulnerable system.
“The vulnerability ( CVE-2019-1861) is due to improper validation of files uploaded to the affected application. An attacker could exploit this vulnerability by authenticating to the affected system”
Cisco fixed this vulnerability in its new software releases 1.6.0 for Cisco Industrial Network Director.
Another high severity vulnerability ( CVE-2019-1845) that affected Cisco Unified Communications Manager IM&P Service, Cisco TelePresence VCS, and Cisco Expressway let attackers perform Denial of Service.
According to Cisco, This vulnerability affects the Cisco following products if users are running a vulnerable release:
Cisco Industrial Network Director Remote Code Execution Vulnerability | High | CVE-2019-1861 |
Cisco Unified Communications Manager IM&P Service, Cisco TelePresence VCS, and Cisco Expressway Series Denial of Service Vulnerability | High | CVE-2019-1845 |
Cisco Webex Meetings Server Information Disclosure Vulnerability | Medium | CVE-2019-1868 |
Cisco TelePresence Video Communication Server and Cisco Expressway Series Server-Side Request Forgery Vulnerability | Medium | CVE-2019-1872 |
Cisco Unified Computing System BIOS Signature Bypass Vulnerability | Medium | CVE-2019-1880 |
Cisco IOS XR Software Secure Shell Authentication Vulnerability | Medium | CVE-2019-1842 |
Cisco Industrial Network Director Stored Cross-Site Scripting Vulnerability | Medium | CVE-2019-1882 |
Cisco Industrial Network Director Cross-Site Request Forgery Vulnerability | Medium | CVE-2019-1881 |
Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability | Medium | CVE-2019-1870 |
Cisco advised affected users to apply these patches immediately to keep the network safe and secure.
The patches can be deployed through Patch Manager plus, where you can pre-built, tested, ready-to-deploy packages for your Enterprise network.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates, also you can take the Best Cybersecurity courses online to keep yourself updated.
Also Read:
Cisco Fixed Routers Vulnerabilities that Allows Hackers to Run Remote Code with Root Access
Dell Technologies has released a security update for its Wyse Management Suite (WMS) to address…
The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team Assessment…
IBM has issued a security bulletin warning customers about a vulnerability in its Workload Scheduler…
Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions of…
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…