Cisco Updates
3338Warning Date
Severity Level
Warning Number
Target Sector
23 June, 2020
● High
2020-1387
All
Description:
Cisco has released security updates to address multiple vulnerabilities in the following products:
- Cisco Webex Meetings sites
- Releases WBS 39.5.25 and earlier
- WBS 40.4.10 and earlier
- Releases WBS 40.6.0
- Cisco Webex Meetings Server
- Releases 4.0MR3 and earlier
- Cisco Webex Meetings Desktop App
- Releases earlier than Release 39.5.12.
- Cisco Webex Meetings Desktop App for Windows
- Releases earlier than 40.6.0.
- Cisco Webex Meetings Desktop App for Mac
- earlier than Release 39.5.11.
- Cisco TelePresence Collaboration Endpoint Software and RoomOS Software
- Releases earlier than May Drop 2 2020.
- Cisco Small Business routers and firmware releases:
- RV016 Multi-WAN VPN: 4.2.3.10 and earlier
- RV042 Dual WAN VPN: 4.2.3.10 and earlier
- RV042G Dual Gigabit WAN VPN: 4.2.3.10 and earlier
- RV082 Dual WAN VPN: 4.2.3.10 and earlier
- RV320 Dual Gigabit WAN VPN: 1.5.1.05 and earlier
- RV325 Dual Gigabit WAN VPN: 1.5.1.05 and earlier
- Cisco Small Business RV110W Wireless-N VPN Firewall
- 1.2.2.5 and earlier
- Cisco Small Business RV130 VPN Router
- 1.0.3.54 and earlier
- Cisco Small Business RV130W Wireless-N Multifunction VPN Router
- 1.0.3.54 and earlier
- Cisco Small Business RV215W Wireless-N VPN Router
- 1.3.1.5 and earlier
- Cisco IOS XR Software Train
- 6.7
- 6.7.1
- 7.0
- 7.0.2, 7.0.11, 7.0.12
- 6.7
- 7.1
- 7.1.1, 7.1.15
- Cisco Umbrella
- Cisco UCS Director software
- releases earlier than Release 6.7.4.0.
- Cisco SSM On-Prem
- Releases earlier than Release 8-202004.
- Cisco NSO software releases earlier than
- Release 4.7.7.3 and Release 5.1.4.2.
- Cisco Enterprise NFVIS
- Releases earlier than Release 4.1.1.
- Cisco AMP for Endpoints (MacOS and Linux)
- ClamAV
- Cisco ESA
- Releases earlier than Release 13.5.0.
Threats:
a remote attacker could exploit these vulnerabilities by doing the following:
- Gain unauthorized access to a vulnerable Webex site remotely
- Execute programs on an affected system remotely
- Execute arbitrary code remotely
- Gain access to sensitive information on an affected system remotely.
- Create arbitrary user accounts remotely.
- Denial of service (DoS) remotely
Best practice and Recommendations:
The CERT team encourages users to review Cisco security advisory and apply the necessary updates:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-token-zPvEjKN
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-client-url-fcmpdfVY
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-client-mac-X7vp65BL
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tp-cmd-inj-7ZpWhvZb
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-stack-vUxHmnNz
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-injection-tWC7krKQ
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-routers-Rj5JRfF8
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-client-NBmqM9vt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xracl-zbWSWREt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-open-redire-UgK9dWK4
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-task-path-trav-d67ZuAk7
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-info-disclosure-gSMU8EKT
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-on-prem-access-ctrl-fpQRfdpf
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-info-disclosure-WdNvBTNq
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-ptrav-SHMzzwVR
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-famp-ZEpdXy
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-WO4BZ75s