Your review has been sent successfully

Cisco Updates

1951
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

20 August, 2020

● High

2020-1663

All

Description:

Cisco has released security updates to address several vulnerabilities in the following products:

  • Cisco HyperFlex HX-Series Software
    • 4.0(2a) and earlier
  • Cisco Video Surveillance 8000 Series IP Cameras firmware
    • releases earlier than Release 1.0.9-4.
  • Cisco CMX
    • releases 10.6.0, 10.6.1, and 10.6.2.
  • Cisco Vision Dynamic Signage Director
    • releases earlier than Release 6.2 SP5.
  • Cisco DCNM Software
    • releases earlier than Release 11.4(1).
  • Cisco DNA Center software
  • 250 Series Smart Switches
  • 350 Series Managed Switches
  • 350X Series Stackable Managed Switches
  • 550X Series Stackable Managed Switches
  • Small Business 200 Series Smart Switches
  • Small Business 300 Series Managed Switches
  • Small Business 500 Series Stackable Managed Switches
  • Cisco Webex Meetings Desktop App for Windows
    • releases earlier than Release 40.8.
  • Video Surveillance 3000 Series IP Cameras
  • Video Surveillance 4000 Series High-Definition IP Cameras
  • Video Surveillance 4300E and 4500E High-Definition IP Cameras
  • Video Surveillance 6000 Series IP Cameras
  • Video Surveillance 7000 Series IP Cameras
  • Video Surveillance PTZ IP Cameras
  • Cisco SSM On-Prem
    • releases earlier than version 8-202004 and all 6.x Cisco Smart Software Manager satellite releases.
  • Cisco ENCS 5400-W Series and CSP 5000-W Series appliances if they are running Cisco vWAAS with NFVIS-bundled image
    • releases 6.4.5, or 6.4.3d and earlier.

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Denial of service attack (DoS)
  • Elevate privileges
  • Execute arbitrary code
  • Sensitive information disclosure
  • Authentication bypass

Best practice and Recommendations:

The CERT team encourages users to review Cisco security advisory and apply the necessary updates:

Last updated at 20 August, 2020

Rate the content

rate-icon
up icon