You are here
Home > Preporuke > Ranjivosti više Cisco proizvoda

Ranjivosti više Cisco proizvoda

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Below is the list of Cisco Security Advisories published by Cisco PSIRT on 2020-October-07.

The following PSIRT security advisories (3 High) were published at 16:00 UTC today.

Table of Contents:

1) Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and Denial of Service Vulnerability – SIR: High

2) Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability – SIR: High

3) Cisco Identity Services Engine Authorization Bypass Vulnerability – SIR: High

+——————————————————————–

1) Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and Denial of Service Vulnerability

CVE-2020-3544

SIR: High

CVSS Score v(3.1): 8.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-rcedos-mAHR8vNx [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-rcedos-mAHR8vNx”]

+——————————————————————–

2) Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability

CVE-2020-3535

SIR: High

CVSS Score v(3.1): 7.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN”]

+——————————————————————–

3) Cisco Identity Services Engine Authorization Bypass Vulnerability

CVE-2020-3467

SIR: High

CVSS Score v(3.0): 7.7

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-uJWqLTZM [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-uJWqLTZM”]

—–BEGIN PGP SIGNATURE—–
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=q9/j
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Below is the list of Cisco Security Advisories published by Cisco PSIRT on 2020-October-07.

The following PSIRT security advisories (3 High) were published at 16:00 UTC today.

Table of Contents:

1) Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and Denial of Service Vulnerability – SIR: High

2) Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability – SIR: High

3) Cisco Identity Services Engine Authorization Bypass Vulnerability – SIR: High

+——————————————————————–

1) Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and Denial of Service Vulnerability

CVE-2020-3544

SIR: High

CVSS Score v(3.1): 8.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-rcedos-mAHR8vNx [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-rcedos-mAHR8vNx”]

+——————————————————————–

2) Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability

CVE-2020-3535

SIR: High

CVSS Score v(3.1): 7.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN”]

+——————————————————————–

3) Cisco Identity Services Engine Authorization Bypass Vulnerability

CVE-2020-3467

SIR: High

CVSS Score v(3.0): 7.7

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-uJWqLTZM [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-uJWqLTZM”]

—–BEGIN PGP SIGNATURE—–
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=SFDs
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorBruno Varga
Cert idNCERT-REF-2020-10-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa golang-github-seccomp-libseccomp-golang

Otkriven je sigurnosni nedostatak u programskom paketu golang-github-seccomp-libseccomp-golang za operacijski sustav Ubuntu. Otkriveni nedostatak potencijalnim napadačima omogućuje zaobilaženje sigurnosnih ograničenja....

Close