You are here
Home > Preporuke > Ranjivosti više Cisco proizvoda

Ranjivosti više Cisco proizvoda

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Below is the list of Cisco Security Advisories published by Cisco PSIRT on 2019-August-28.

The following PSIRT security advisories (1 Critical, 5 High) were published at 16:00 UTC today.

Table of Contents:

1) Cisco REST API Container for IOS XE Software Authentication Bypass Vulnerability – SIR: Critical

2) Cisco NX-OS Software Remote Management Memory Leak Denial of Service Vulnerability – SIR: High

3) Cisco Unified Computing System Fabric Interconnect root Privilege Escalation Vulnerability – SIR: High

4) Cisco NX-OS Software IPv6 Denial of Service Vulnerability – SIR: High

5) Cisco FXOS and NX-OS Software Authenticated Simple Network Management Protocol Denial of Service Vulnerability – SIR: High

6) Cisco NX-OS Software Cisco Fabric Services over IP Denial of Service Vulnerability – SIR: High

+——————————————————————–

1) Cisco REST API Container for IOS XE Software Authentication Bypass Vulnerability

CVE-2019-12643

SIR: Critical

CVSS Score v(3.0): 10.0

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-iosxe-rest-auth-bypass [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-iosxe-rest-auth-bypass”]

+——————————————————————–

2) Cisco NX-OS Software Remote Management Memory Leak Denial of Service Vulnerability

CVE-2019-1965

SIR: High

CVSS Score v(3.0): 7.7

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-memleak-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-memleak-dos”]

+——————————————————————–

3) Cisco Unified Computing System Fabric Interconnect root Privilege Escalation Vulnerability

CVE-2019-1966

SIR: High

CVSS Score v(3.0): 7.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-ucs-privescalation [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-ucs-privescalation”]

+——————————————————————–

4) Cisco NX-OS Software IPv6 Denial of Service Vulnerability

CVE-2019-1964

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ipv6-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ipv6-dos”]

+——————————————————————–

5) Cisco FXOS and NX-OS Software Authenticated Simple Network Management Protocol Denial of Service Vulnerability

CVE-2019-1963

SIR: High

CVSS Score v(3.0): 7.7

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-fxnxos-snmp-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-fxnxos-snmp-dos”]

+——————————————————————–

6) Cisco NX-OS Software Cisco Fabric Services over IP Denial of Service Vulnerability

CVE-2019-1962

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-fsip-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-fsip-dos”]

—–BEGIN PGP SIGNATURE—–
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=zNHa
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa Ceph

Otkriven je sigurnosni nedostatak u programskom paketu Ceph za operacijski sustav Ubuntu. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja....

Close