You are here
Home > Preporuke > Ranjivosti više Cisco proizvoda

Ranjivosti više Cisco proizvoda

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Below is the list of Cisco Security Advisories published by Cisco PSIRT on 2020-February-05.

The following PSIRT security advisories (5 High) were published at 16:00 UTC today.

Table of Contents:

1) Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability – SIR: High

2) Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and Denial of Service Vulnerability – SIR: High

3) Cisco IOS XR Software Cisco Discovery Protocol Format String Vulnerability – SIR: High

4) Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability – SIR: High

5) Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability – SIR: High

+——————————————————————–

1) Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability

CVE-2020-3111

SIR: High

CVSS Score v(3.0): 8.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-voip-phones-rce-dos”]

+——————————————————————–

2) Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and Denial of Service Vulnerability

CVE-2020-3110

SIR: High

CVSS Score v(3.0): 8.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-ipcameras-rce-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-ipcameras-rce-dos”]

+——————————————————————–

3) Cisco IOS XR Software Cisco Discovery Protocol Format String Vulnerability

CVE-2020-3118

SIR: High

CVSS Score v(3.0): 8.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-iosxr-cdp-rce [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-iosxr-cdp-rce”]

+——————————————————————–

4) Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability

CVE-2020-3120

SIR: High

CVSS Score v(3.0): 7.4

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-fxnxos-iosxr-cdp-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-fxnxos-iosxr-cdp-dos”]

+——————————————————————–

5) Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability

CVE-2020-3119

SIR: High

CVSS Score v(3.0): 8.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-nxos-cdp-rce [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-nxos-cdp-rce”]

—–BEGIN PGP SIGNATURE—–
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=Z3qP
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorToni Vugdelija
Cert idNCERT-REF-2020-02-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa Red Hat Single Sign-On

Otkriveni su sigurnosni nedostaci u programskom paketu Red Hat Single Sign-On za operacijski sustav RHEL. Otkriveni nedostaci potencijalnim udaljenim napadačima...

Close