You are here
Home > Preporuke > Ranjivosti više Cisco proizvoda

Ranjivosti više Cisco proizvoda

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Below is the list of Cisco Security Advisories published by Cisco PSIRT on 2021-January-13.

The following PSIRT security advisories (4 High) were published at 16:00 UTC today.

Table of Contents:

1) Cisco AnyConnect Secure Mobility Client for Windows DLL Injection Vulnerability – SIR: High

2) Cisco Connected Mobile Experiences Privilege Escalation Vulnerability – SIR: High

3) Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Command Injection Vulnerabilities – SIR: High

4) Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities – SIR: High

+——————————————————————–

1) Cisco AnyConnect Secure Mobility Client for Windows DLL Injection Vulnerability

CVE-2021-1237

SIR: High

CVSS Score v(3.1): 7.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-injec-pQnryXLf [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-injec-pQnryXLf”]

+——————————————————————–

2) Cisco Connected Mobile Experiences Privilege Escalation Vulnerability

CVE-2021-1144

SIR: High

CVSS Score v(3.1): 8.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmxpe-75Asy9k [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmxpe-75Asy9k”]

+——————————————————————–

3) Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Command Injection Vulnerabilities

CVE-2021-1146, CVE-2021-1147, CVE-2021-1148, CVE-2021-1149, CVE-2021-1150

SIR: High

CVSS Score v(3.1): 7.2

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-LBdQ2KRN [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-sa-rv-command-inject-LBdQ2KRN”]

+——————————————————————–

4) Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities

CVE-2021-1159, CVE-2021-1160, CVE-2021-1161, CVE-2021-1162, CVE-2021-1163, CVE-2021-1164, CVE-2021-1165, CVE-2021-1166, CVE-2021-1167, CVE-2021-1168, CVE-2021-1169, CVE-2021-1170, CVE-2021-1171, CVE-2021-1172, CVE-2021-1173, CVE-2021-1174, CVE-2021-1175, CVE-2021-1176, CVE-2021-1177, CVE-2021-1178, CVE-2021-1179, CVE-2021-1180, CVE-2021-1181, CVE-2021-1182, CVE-2021-1183, CVE-2021-1184, CVE-2021-1185, CVE-2021-1186, CVE-2021-1187, CVE-2021-1188, CVE-2021-1189, CVE-2021-1190, CVE-2021-1191, CVE-2021-1192, CVE-2021-1193, CVE-2021-1194, CVE-2021-1195, CVE-2021-1196, CVE-2021-1197, CVE-2021-1198, CVE-2021-1199, CVE-2021-1200, CVE-2021-1201, CVE-2021-1202, CVE-2021-1203, CVE-2021-1204, CVE-2021-1205, CVE-2021-1206, CVE-2021-1207, CVE-2021-1208, CVE-2021-1209, CVE-2021-1210, CVE-2021-1211, CVE-2021-1212, CVE-2021-1213, CVE-2021-1214, CVE-2021-1215, CVE-2021-1216, CVE-2021-1217, CVE-2021-1307, CVE-2021-1360

SIR: High

CVSS Score v(3.1): 7.2

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-sa-rv-overflow-WUnUgv4U”]
—–BEGIN PGP SIGNATURE—–

iQKDBAEBAgBtBQJf/x4GZhxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50
IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDIwLTIwMjEgW3JlZnJl
c2hdKSA8cHNpcnRAY2lzY28uY29tPgAKCRCbFvaOC+BFevJ4D/406xVTY2jOcOoi
uVm5NyelW8JvndHa9pUhpUUpnsSuxgnAHzPlhJt72BqbMwKmkf2LtM2J4tEWma1j
5ellH7H9supIAxWx/niKdhIk4yxRVqN2CGVllY9WNK8ifbh3mjgF+ueRBLKjEOqx
0SUy3ujfwtx3ut3rpC9vXBnhpU0OMFzphzTZQO+L0TqsZyUxhKPzgAi3hNbBquEm
6RCt2Zf1rl5LlaDdhUmKCNsyw5nRFI3gN5wmovDZ2IyZUyivaFHIOMU5Sb58vgsl
KSd+BtW7ZQxnUtIlsIRcFt3G/iwNZSy1QdglhONJ/qqg9tlH0axYgpoGNngBu0vL
moJb39B2MS72t+J9qR6Zmdm2oISvlHg3w0Wl082SFQAcHtHiOWaVjsFiXPbbLkxB
s71Ah2kVKGR6rdc04vlnzj4YlPbB3r53/KcD/GDoJ9PCptPPSVN71kc9hFyqjFhA
Ic6iTYfZ2/f4AeLcHMU6+jD0iooAlFbgltJxRRq9eJfY00tJ8iphlRsymjBhp8Vq
BiU+DnjxWD5P+vL0z+LEm6eebOZ6bJEgJ11A7KFSCmVtdKCOfHxuAmTle5Pb6DJI
x1Gv3VUMcf0pNl3gyKq5saSdLYls5vPbwICP+TGe93J8S5JP25oF+SQPrWd+n91U
c7MijIBkaYjBlOtud2vRo9kCmqxlDg==
=OGQF
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Autor161.53.13.146
Cert idNCERT-REF-2021-01-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa kernel headers

Otkriven je sigurnosni nedostatak u programskom paketu kernel headers za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izvršavanje proizvoljnog...

Close