Sunday, June 15, 2025
HomeSecurity UpdatesCisco Security Updates - Vulnerabilities in Cisco Products Let Hackers Gain Unauthorized...

Cisco Security Updates – Vulnerabilities in Cisco Products Let Hackers Gain Unauthorized Remote Access

Published on

SIEM as a Service

Follow Us on Google News

Cisco released new security update with the patches for several vulnerabilities that affected various Cisco products including Cisco Web Security Appliance, Cisco IP phone, Fabric switches, Email Security Appliances and more.

Totality 19 vulnerabilities are fixed, in which 10 vulnerabilities are categorized under high severity, 8 fixed under Medium severity, 1 fixed under informational.

A vulnerability ( CVE-2019-1894 ) affected Cisco Enterprise NFV Infrastructure Software allows a remote attacker who has admin level permission will overwrite or read arbitrary files on vulnerable devices.

- Advertisement - Google News

Another high severity vulnerability (CVE-2019-1892 ) resides in the Secure Sockets Layer (SSL) input packet processor let a remote attacker cause memory corruption on Cisco Small Business 200, 300, and 500 Series Managed Switches.

Vulnerability ( CVE-2019-1884 ) in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance could allow an authenticated, remote attacker to cause a denial of service (DoS). 

Privilege Escalation Vulnerability (CVE-2019-1889 ) resides in the Cisco Application Policy Infrastructure Controller REST API allows remote attackers to escalate the privilege to gain root access from the affected device.

Cisco Security Update List

Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability
Cisco Small Business Series Switches Memory Corruption Vulnerability
Cisco Small Business Series Switches HTTP Denial of Service Vulnerability
Cisco Enterprise NFV Infrastructure Software Arbitrary File Read and Write Vulnerability
Cisco Enterprise NFV Infrastructure Software Command Injection Vulnerability
Cisco Nexus 9000 Series Fabric Switches ACI Mode Fabric Infrastructure VLAN Unauthorized Access Vulnerability
Cisco Jabber for Windows DLL Preloading Vulnerability
Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability
Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability
Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability
Cisco IP Phone 7800 and 8800 Series Session Initiation Protocol Denial of Service Vulnerability
Cisco IOS XR Software Border Gateway Protocol Denial of Service Vulnerability
Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities
Cisco Email Security Appliance Content Filter Bypass Vulnerability
Cisco Email Security Appliance Content Filter Bypass Vulnerability
Cisco Unified Communications Domain Manager Restricted Shell Escape Vulnerability
Cisco Advanced Malware Protection for Endpoints Windows Command Injection Vulnerability
Multiple Issues in Cisco Small Business 250/350/350X/550X Series Switches Firmware and Cisco FindIT Network Probe
Multiple Issues in Cisco Small Business 250/350/350X/550X Series Switches Firmware and Cisco FindIT Network Probe

Cisco advised affected customers to apply these patches immediately to keep the network and application safe and secure from cyber attack.

Cisco has released updates to address this vulnerability; you can find the advisory here.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read:

Cisco Security Updates – RCE Flaw in Cisco Industrial Network Director Let Hackers Gain Admin Level Access

Cisco Patches Critical Vulnerability that allows Remote Attacker to Conduct CSRF Attack

Cisco Security Updates – Critical RCE vulnerability let Hackers Gain Control Over Cisco Data Center Network Manager Remotely

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Windows 11 Security Update for 22H2 & 23H2 May Cause Recovery Errors

A recent Windows 11 security update, KB5058405, released on May 13, 2025, has caused...

Xerox Launches April 2025 Security Patch for FreeFlow Print Server v2

Xerox has launched its April 2025 Security Patch Update for the FreeFlow Print Server...

Ivanti Released Security Update With The Fixes for Critical Endpoint Manager RCE Vulnerabilities

Ivanti, a prominent enterprise software provider, has issued an urgent security advisory today addressing...