Cisco Updates
3091Warning Date
Severity Level
Warning Number
Target Sector
8 October, 2020
● High
2020-1895
All
Description:
Cisco has released security updates to address several vulnerabilities in the following products:
- Cisco Webex Teams for Windows
- releases 3.0.13464.0 through 3.0.16040.0
- Cisco ISE
- Cisco Video Surveillance 8000 Series IP Cameras
- Cisco ASR 5000 Series Routers
- Cisco vManage Software
- releases earlier than releases 20.1.2 and 20.3.1
- Cisco Nexus Data Broker
- releases 3.9(0) and earlier
- Cisco ISE Software:
- 2.2p16 and earlier
- 2.3p7 and earlier
- 2.4p12 and earlier
- 2.6p7 and earlier
- 2.7p2 and earlier
- Cisco IND
- releases earlier than Release 1.9.0
- Cisco Firepower Management Center
- releases 6.6.1 and earlier.
- Cisco Expressway Series and Cisco TelePresence VCS
- releases X12.6.3 and earlier
- Cisco AsyncOS Software for Cisco ESA
- releases 13.5.2 and earlier.
- Cisco Vision Dynamic Signage Director
- releases earlier than Release 6.2 SP6
- Cisco Video Surveillance 8000 Series IP Cameras firmware
- releases earlier than Release 1.0.9-5
Threats:
An attacker could exploit these vulnerabilities by doing the following:
- Code execution
- Denial of service attack (DoS)
- Bypass of a protection mechanism
- Escalation of privilege
- URL Filtering Bypass
- Cross-site scripting (XSS)
Best practice and Recommendations:
The CERT team encourages users to review Cisco security advisory and apply the necessary updates:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-dll-drsnH5AN
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-uJWqLTZM
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-rcedos-mAHR8vNx
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-privilege-esc-pyb7YTd
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-priv-esc-gGCUMFxv
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-xss-xXeLFpC3
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-path-traversal-wVDyXZPy
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxs-mf5cbYx5
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-dos-BwG634zn
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-yLrjqqU
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-vcs-dos-n6xxTMZB
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-zZtugtg3
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-missing-auth-rQO88rnj
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-memleak-heyebx9