Report Incident
× Home Cybertech Africa 2023 2 DPO Rw-CSIRT Website About Rw-CSIRT Alerts Advisories About NCSA Documentation News & Events Topics Contact us Opportunities Privacy Policy

Cisco Security Updates

Description

Cisco has released software updates to address vulnerabilities in multiple Cisco products software that could permit an unauthenticated, remote, malicious actor to execute arbitrary code or allow an authenticated, local malicious threat to gain escalated privileges on an unpatched system.

The following 4 vulnerabilities are the most recent with high impact:

  • A TLS certificate validation:

In Cisco Email Security Appliance (ESA), Cisco Advanced Malware Protection (AMP) and Cisco Web Security Appliance (WSA).
This vulnerability is due to improper certificate validation when an affected device
establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. Read More...

  • User session hijacking, cross-site scripting (XSS) and HTML injection:

In the web-based management interface of Cisco Small Business 220 Series Smart Switches.
This vulnerability is due to the use of weak session management for session identifier
values. Read More...

  • DLL hijacking attack:

In the DLL loading mechanism of Cisco AnyConnect Secure Mobility Client for Windows
with VPN Posture (HostScan) Module installed on the AnyConnect client.
This vulnerability is due to a race condition in the signature verification process for DLL files that are loaded on an affected device. Read More...

  • A X.509 certificate validation:

In the Cisco Identity Services Engine (ISE) integration feature of the Cisco DNA Center
Software.
This vulnerability is due to an incomplete validation of the X.509 certificate used when
establishing a connection between DNA Center and an ISE server Read More...

 

Recommendation

The National Cyber Security Authority (NCSA) recommends administrators to review the Cisco Security Advisories page, check the list of all vulnerabilities and apply the latest security updates as soon as possible.

For further information and support, please contact the National Cyber Security Authority (NCSA) by email to rwcsirt@ncsa.gov.rw or call us on 9009

 

Reference
https://tools.cisco.com/security/center/publicationListing.x

Related Files

 

18 June 2021

© 2024 National Cyber Security Authority