You are here
Home > Preporuke > Ranjivosti više Cisco proizvoda

Ranjivosti više Cisco proizvoda

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Below is the list of Cisco Security Advisories published by Cisco PSIRT on 2020-September-24.

The following PSIRT security advisories (29 High) were published at 16:00 UTC today.

Table of Contents:

1) Cisco IOS XE Software Common Open Policy Service Engine Denial of Service Vulnerability – SIR: High

2) Cisco Aironet Access Points Ethernet Wired Clients Denial of Service Vulnerability – SIR: High

3) Cisco IOS XE ROM Monitor Software Vulnerability – SIR: High

4) Cisco IOS XE Software Ethernet Frame Denial of Service Vulnerability – SIR: High

5) Cisco IOS XE Software for Cisco ASR 900 Series Route Switch Processor 3 Arbitrary Code Execution Vulnerabilities – SIR: High

6) Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability – SIR: High

7) Cisco IOS and IOS XE Software ISDN Q.931 Denial of Service Vulnerability – SIR: High

8) Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability – SIR: High

9) Cisco IOS XE Software for Cisco cBR-8 Converged Broadband Routers DHCP Denial of Service Vulnerability – SIR: High

10) Cisco IOS XE Software for Catalyst 9200 Series Switches Umbrella Connector Denial of Service Vulnerability – SIR: High

11) Cisco Catalyst 9200 Series Switches Jumbo Frame Denial of Service Vulnerability – SIR: High

12) Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WPA Denial of Service Vulnerability – SIR: High

13) Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability – SIR: High

14) Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers Multicast DNS Denial of Service Vulnerability – SIR: High

15) Cisco IOS XE Software for Catalyst 9800 Series and Cisco AireOS Software for Cisco WLC Flexible NetFlow Version 9 Denial of Service Vulnerability – SIR: High

16) Cisco IOS XE Software Privilege Escalation Vulnerabilities – SIR: High

17) Cisco IOS Software for Cisco Industrial Routers Virtual-LPWA Unauthorized Access Vulnerability – SIR: High

18) Cisco IOS XE Software IP Service Level Agreements Denial of Service Vulnerability – SIR: High

19) Cisco IOS XE Software Zone-Based Firewall Denial of Service Vulnerabilities – SIR: High

20) Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities – SIR: High

21) Cisco IOS XE Software Arbitrary Code Execution Vulnerability – SIR: High

22) Cisco IOS XE Software for Cisco 4461 Integrated Services Routers Denial of Service Vulnerability – SIR: High

23) Cisco IOS and IOS XE Software PROFINET Denial of Service Vulnerability – SIR: High

24) Cisco IOS and IOS XE Software Split DNS Denial of Service Vulnerability – SIR: High

25) Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability – SIR: High

26) Cisco IOS XE Software Web UI Authorization Bypass Vulnerability – SIR: High

27) Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability – SIR: High

28) Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Trap Denial of Service Vulnerability – SIR: High

29) Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability – SIR: High

+——————————————————————–

1) Cisco IOS XE Software Common Open Policy Service Engine Denial of Service Vulnerability

CVE-2020-3526

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-COPS-VLD-MpbTvGEW [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-COPS-VLD-MpbTvGEW”]

+——————————————————————–

2) Cisco Aironet Access Points Ethernet Wired Clients Denial of Service Vulnerability

CVE-2020-3552

SIR: High

CVSS Score v(3.0): 7.4

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ethport-dos-xtjTt8pY [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ethport-dos-xtjTt8pY”]

+——————————————————————–

3) Cisco IOS XE ROM Monitor Software Vulnerability

CVE-2020-3524

SIR: High

CVSS Score v(3.0): 6.4

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rommon-secboot-7JgVLVYC [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rommon-secboot-7JgVLVYC”]

+——————————————————————–

4) Cisco IOS XE Software Ethernet Frame Denial of Service Vulnerability

CVE-2020-3465

SIR: High

CVSS Score v(3.1): 7.4

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-le-drTOB625 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-le-drTOB625”]

+——————————————————————–

5) Cisco IOS XE Software for Cisco ASR 900 Series Route Switch Processor 3 Arbitrary Code Execution Vulnerabilities

CVE-2020-3416, CVE-2020-3513

SIR: High

CVSS Score v(3.1): 6.7

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-rsp3-rce-jVHg8Z7c [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-rsp3-rce-jVHg8Z7c”]

+——————————————————————–

6) Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability

CVE-2020-3508

SIR: High

CVSS Score v(3.1): 7.4

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esp20-arp-dos-GvHVggqJ [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esp20-arp-dos-GvHVggqJ”]

+——————————————————————–

7) Cisco IOS and IOS XE Software ISDN Q.931 Denial of Service Vulnerability

CVE-2020-3511

SIR: High

CVSS Score v(3.0): 7.4

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-isdn-q931-dos-67eUZBTf [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-isdn-q931-dos-67eUZBTf”]

+——————————————————————–

8) Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability

CVE-2020-3512

SIR: High

CVSS Score v(3.0): 7.4

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5”]

+——————————————————————–

9) Cisco IOS XE Software for Cisco cBR-8 Converged Broadband Routers DHCP Denial of Service Vulnerability

CVE-2020-3509

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-dhcp-dos-JSCKX43h [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-dhcp-dos-JSCKX43h”]

+——————————————————————–

10) Cisco IOS XE Software for Catalyst 9200 Series Switches Umbrella Connector Denial of Service Vulnerability

CVE-2020-3510

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-umbrella-dos-t2QMUX37 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-umbrella-dos-t2QMUX37”]

+——————————————————————–

11) Cisco Catalyst 9200 Series Switches Jumbo Frame Denial of Service Vulnerability

CVE-2020-3527

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-JP-DOS-g5FfGm8y [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-JP-DOS-g5FfGm8y”]

+——————————————————————–

12) Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WPA Denial of Service Vulnerability

CVE-2020-3429

SIR: High

CVSS Score v(3.0): 7.4

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wpa-dos-cXshjerc [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wpa-dos-cXshjerc”]

+——————————————————————–

13) Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability

CVE-2020-3428

SIR: High

CVSS Score v(3.0): 7.4

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dclass-dos-VKh9D8k3 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dclass-dos-VKh9D8k3”]

+——————————————————————–

14) Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers Multicast DNS Denial of Service Vulnerability

CVE-2020-3359

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mdns-dos-3tH6cA9J [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mdns-dos-3tH6cA9J”]

+——————————————————————–

15) Cisco IOS XE Software for Catalyst 9800 Series and Cisco AireOS Software for Cisco WLC Flexible NetFlow Version 9 Denial of Service Vulnerability

CVE-2020-3492

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-fnfv9-EvrAQpNX [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-fnfv9-EvrAQpNX”]

+——————————————————————–

16) Cisco IOS XE Software Privilege Escalation Vulnerabilities

CVE-2020-3141, CVE-2020-3425

SIR: High

CVSS Score v(3.1): 8.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM”]

+——————————————————————–

17) Cisco IOS Software for Cisco Industrial Routers Virtual-LPWA Unauthorized Access Vulnerability

CVE-2020-3426

SIR: High

CVSS Score v(3.1): 7.5

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lpwa-access-cXsD7PRA [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lpwa-access-cXsD7PRA”]

+——————————————————————–

18) Cisco IOS XE Software IP Service Level Agreements Denial of Service Vulnerability

CVE-2020-3422

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-jw2DJmSv [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-jw2DJmSv”]

+——————————————————————–

19) Cisco IOS XE Software Zone-Based Firewall Denial of Service Vulnerabilities

CVE-2020-3421, CVE-2020-3480

SIR: High

CVSS Score v(3.1): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-94ckG4G [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-94ckG4G”]

+——————————————————————–

20) Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities

CVE-2020-3486, CVE-2020-3487, CVE-2020-3488, CVE-2020-3489, CVE-2020-3493, CVE-2020-3494, CVE-2020-3497

SIR: High

CVSS Score v(3.0): 7.4

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq”]

+——————————————————————–

21) Cisco IOS XE Software Arbitrary Code Execution Vulnerability

CVE-2020-3417

SIR: High

CVSS Score v(3.1): 6.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xbace-OnCEbyS [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xbace-OnCEbyS”]

+——————————————————————–

22) Cisco IOS XE Software for Cisco 4461 Integrated Services Routers Denial of Service Vulnerability

CVE-2020-3414

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ISR4461-gKKUROhx [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ISR4461-gKKUROhx”]

+——————————————————————–

23) Cisco IOS and IOS XE Software PROFINET Denial of Service Vulnerability

CVE-2020-3409

SIR: High

CVSS Score v(3.0): 7.4

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-profinet-J9QMCHPB [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-profinet-J9QMCHPB”]

+——————————————————————–

24) Cisco IOS and IOS XE Software Split DNS Denial of Service Vulnerability

CVE-2020-3408

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-splitdns-SPWqpdGW [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-splitdns-SPWqpdGW”]

+——————————————————————–

25) Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability

CVE-2020-3407

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confacl-HbPtfSuO [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confacl-HbPtfSuO”]

+——————————————————————–

26) Cisco IOS XE Software Web UI Authorization Bypass Vulnerability

CVE-2020-3400

SIR: High

CVSS Score v(3.0): 8.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-auth-bypass-6j2BYUc7 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-auth-bypass-6j2BYUc7”]

+——————————————————————–

27) Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability

CVE-2020-3399

SIR: High

CVSS Score v(3.1): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-ShFzXf [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-ShFzXf”]

+——————————————————————–

28) Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Trap Denial of Service Vulnerability

CVE-2020-3390

SIR: High

CVSS Score v(3.0): 7.4

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-snmp-dos-wNkedg9K [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-snmp-dos-wNkedg9K”]

+——————————————————————–

29) Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability

CVE-2020-3560

SIR: High

CVSS Score v(3.0): 8.6

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y”]

—–BEGIN PGP SIGNATURE—–
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=qUf4
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorBruno Varga
Cert idNCERT-REF-2020-09-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa ovmf

Otkriven je sigurnosni nedostatak u programskom paketu ovmf za operacijski sustav openSUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja....

Close