Cisco Updates
3094Warning Date
Severity Level
Warning Number
Target Sector
20 February, 2020
● High
2020-936
All
Description:
Cisco has released an updates to address a vulnerabilities in the following products:
- Cisco Smart Software Manager On-Prem
- Releases earlier than 7-202001 if the High Availability (HA) feature is enabled. HA is not enabled by default.
- Cisco Unified Contact Center Express Software
- Releases earlier than 12.5(1).
- If they are running a vulnerable BIOS version and a vulnerable Cisco Integrated Management Controller (IMC) firmware release:
- Firepower Management Center (FMC) 1000
- Firepower Management Center (FMC) 2500
- Firepower Management Center (FMC) 4500
- Secure Network Server 3500 Series Appliances
- Secure Network Server 3600 Series Appliances
- Threat Grid 5504 Appliance
- Cisco ESA
- If they are running a vulnerable release of Cisco AsyncOS Software that is configured to use either Cisco AMP or message tracking.
- Cisco SMA virtual and hardware appliances
- If they are running a vulnerable release of Cisco AsyncOS Software that is configured to use either Cisco AMP or message tracking.
- Cisco AsyncOS Software 12.1.0-085
- Cisco Email Security Appliance (ESA).
- Cisco AsyncOS Software 11.1.0-131
- Cisco Email Security Appliance (ESA).
- Cisco DCNM software
- Releases earlier than Release 11.3(1).
- Cisco Unified Contact Center Enterprise
- Releases earlier than Release 12.5(1).
- Cisco NFVIS
- Releases 3.11.1 and earlier.
- Identity Services Engine (ISE)
- Release 2.6.0 patches 1, 2, and 3; and ISE 2.7.0 FCS.
- Cisco Finesse
- Releases earlier than Release 12.5(1).
- Cisco ESA
- Releases earlier than 12.5.1-037 and earlier than 13.0.0-375
- Cisco Cloud Email Security (CES) software
- Releases earlier than 12.5.1-037 and earlier than 13.0.0-375
- Cisco CWS
- Cisco Meeting Server deployments that are running a software release earlier than Release 2.8 and that have the XMPP feature enabled.
- Cisco AnyConnect Secure Mobility Client for Windows
- Releases earlier than 4.8.02042.
- Cisco DCNM software
- Release earlier than Release 11.3(1).
Threats:
Attacker could exploit these vulnerabilities by doing the following:
- Gain access to a sensitive information.
- Obtain read and write access to system data.
- Execute arbitrary command.
- Elevate privileges.
- Bypass the signature validation checks
- Denial of Service (DoS)
- Sending a malicious email message through the targeted device.
- Interact with the API with administrative privileges.
- Upload crafted code to the affected device
- Modify values on or return values from the underlying database.
- Cross-site scripting (XSS)
Best practice and Recommendations:
The CERT team encourages users to review Cisco security advisory and apply the necessary updates:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-on-prem-static-cred-sL8rDs8
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-privesc-Zd7bvwyf
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-ucs-boot-bypass
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-sma-dos
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-esa-dos
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-dcnm-priv-esc
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-dcnm-csrf
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucce-tip-dos-7cdLUASb
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-codex-shs4NhvS
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-s3ekcKch
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-finesse-xss-6OgfQkUT
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-shrt-dos-wM54R8qAhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-shrt-dos-wM54R8qA
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cws-inject-6YTdx7AO
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cms-xmpp-dos-ptfGUsBx
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-win-path-traverse-qO4HWBsj
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-dcnm-xss