You are here
Home > Preporuke > Ranjivosti Cisco SD-WAN Solution proizvoda

Ranjivosti Cisco SD-WAN Solution proizvoda

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Below is the list of Cisco Security Advisories published by Cisco PSIRT on 2020-March-18.

The following PSIRT security advisories (3 High) were published at 16:00 UTC today.

Table of Contents:

1) Cisco SD-WAN Solution Command Injection Vulnerability – SIR: High

2) Cisco SD-WAN Solution Privilege Escalation Vulnerability – SIR: High

3) Cisco SD-WAN Solution Buffer Overflow Vulnerability – SIR: High

+——————————————————————–

1) Cisco SD-WAN Solution Command Injection Vulnerability

CVE-2020-3266

SIR: High

CVSS Score v(3.0): 7.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwclici-cvrQpH9v [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwclici-cvrQpH9v”]

+——————————————————————–

2) Cisco SD-WAN Solution Privilege Escalation Vulnerability

CVE-2020-3265

SIR: High

CVSS Score v(3.0): 7.0

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwpresc-ySJGvE9 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwpresc-ySJGvE9”]

+——————————————————————–

3) Cisco SD-WAN Solution Buffer Overflow Vulnerability

CVE-2020-3264

SIR: High

CVSS Score v(3.0): 7.1

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwanbo-QKcABnS2 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwanbo-QKcABnS2”]

—–BEGIN PGP SIGNATURE—–
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=0LGC
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorToni Vugdelija
Cert idNCERT-REF-2020-03-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa epair

Otkriven je sigurnosni nedostatak u programskom paketu epair za operacijski sustav FreeBSD. Otkriveni nedostatak potencijalnim napadačima omogućuje izvršavanje proizvoljnog programskog...

Close