Cisco IOS XR Software Health Check Open Port Vulnerability

<p>A vulnerability in the health check RPM of Cisco&nbsp;IOS XR Software could allow an unauthenticated, remote attacker to access the Redis instance that is running within the NOSi container.</p>
<p>This vulnerability exists because the health check RPM opens TCP port 6379 by default upon activation. An attacker could exploit this vulnerability by connecting to the Redis instance on the open port. A successful exploit could allow the attacker to write to the Redis in-memory database, write arbitrary files to the container filesystem, and retrieve information about the Redis database. Given the configuration of the sandboxed container that the Redis instance runs in, a remote attacker would be unable to execute remote code or abuse the integrity of the Cisco&nbsp;IOS XR Software host system.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-redis-ABJyE5xK” target=”_blank”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-redis-ABJyE5xK</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20821

Related:

  • No Related Posts

Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability

<p>A vulnerability in the web applications of Cisco&nbsp;UCS Director could allow an authenticated, remote attacker to <span class=”TextRun Highlight SCXO16456276 BCX2″><span class=”NormalTextRun SCXO16456276 BCX2″>conduct a cross-site scripting attack on an affected system.</span></span></p>
<p>This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to affected web applications. A successful exploit could allow the attacker to rewrite web page content, access sensitive information stored in the applications, and alter data by submitting forms.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-UCS-XSS-uQSME3L7″ target=”_blank”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-UCS-XSS-uQSME3L7</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20765

Related:

  • No Related Posts

Cisco Secure Network Analytics Remote Code Execution Vulnerability

<p>A vulnerability in the web-based management interface of Cisco&nbsp;Secure Network Analytics, formerly Cisco&nbsp;Stealthwatch Enterprise, could allow an authenticated, remote attacker to execute arbitrary commands as an administrator on the underlying operating system.</p>
<p>This vulnerability is due to insufficient user input validation by the web-based management interface of the affected software. An attacker could exploit this vulnerability by injecting arbitrary commands in the web-based management interface. A successful exploit could allow the attacker to make configuration changes on the affected device or cause certain services to restart unexpectedly.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealth-rce-2hYb9KFK” target=”_blank”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealth-rce-2hYb9KFK</a></p>
<p><strong>Attention</strong>: Simplifying the Cisco&nbsp;portfolio includes the renaming of security products under one brand: Cisco&nbsp;Secure. For more information, see&nbsp;<a href=”https://www.cisco.com/c/en/us/products/security/secure-names.html”>Meet Cisco&nbsp;Secure</a>.</p>

Security Impact Rating: Medium

CVE: CVE-2022-20797

Related:

  • No Related Posts

Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability

<p>A vulnerability in the web interface of Cisco&nbsp;Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.</p>
<p>This vulnerability is due to insufficient validation of user-supplied input that is processed by the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid <em>agent </em>credentials.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2″>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20802

Related:

  • No Related Posts

Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities

<p>Multiple vulnerabilities in the web-based management interface of Cisco&nbsp;Common Services Platform Collector (CSPC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.</p>
<p>These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.&nbsp;</p>
<p>Cisco&nbsp;has released software updates to address these vulnerabilities. There are no workarounds that address these vulnerabilities.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20666,CVE-2022-20667,CVE-2022-20668,CVE-2022-20669,CVE-2022-20670,CVE-2022-20671,CVE-2022-20672,CVE-2022-20673,CVE-2022-20674

Related:

  • No Related Posts

ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: May 2022

<p>On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed:</p>
<blockquote>
<p>A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.</p>
</blockquote>
<p>For a description of this vulnerability, see the <a href=”https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html”>ClamAV blog</a>.</p>
<p>This advisory will be updated as additional information becomes available.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-prVGcHLd” target=”_blank” rel=”noopener”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-prVGcHLd</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20770

Related:

  • No Related Posts

ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: May 2022

<p>On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed:&nbsp;</p>
<blockquote>
<p>A vulnerability in HTML file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.</p>
</blockquote>
<p>For a description of this vulnerability, see the <a href=”https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html”>ClamAV blog</a>.</p>
<p>This advisory will be updated as additional information becomes available.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-html-XAuOK8mR” target=”_blank” rel=”noopener”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-html-XAuOK8mR</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20785

Related:

  • No Related Posts

ClamAV TIFF File Parsing Denial of Service Vulnerability Affecting Cisco Products: May 2022

<p>On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed:</p>
<blockquote>
<p>A vulnerability in the TIFF file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.</p>
</blockquote>
<p>For a description of this vulnerability, see the <a href=”https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html”>ClamAV blog</a>.</p>
<p>This advisory will be updated as additional information becomes available.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-ZAZBwRVG” target=”_blank” rel=”noopener”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-ZAZBwRVG</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20771

Related:

  • No Related Posts

Cisco Enterprise NFV Infrastructure Software Vulnerabilities

<p> Multiple vulnerabilities in Cisco&nbsp;Enterprise NFV Infrastructure Software (NFVIS) could allow an attacker to escape from the guest virtual machine (VM) to the host machine, inject commands that execute at the <em>root</em> level, or leak system data from the host to the VM.</p>
<p>For more information about these vulnerabilities, see the <a href=”#details”>Details</a> section of this advisory.</p>
<p>Cisco&nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-NFVIS-MUL-7DySRX9″ target=”_blank”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-NFVIS-MUL-7DySRX9</a></p>

Security Impact Rating: Critical

CVE: CVE-2022-20777,CVE-2022-20779,CVE-2022-20780

Related:

  • No Related Posts

Cisco Small Business RV Series Routers Remote Code Execution Vulnerability

<p>A vulnerability in web-based management interface of Cisco&nbsp;Small Business RV340 and RV345 Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device.</p>
<p>This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious input to an affected device. A successful exploit could allow the attacker to execute remote code on the affected device. To exploit this vulnerability, an attacker would need to have valid <em>Administrator</em>&nbsp;credentials on the affected device.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbrv-rce-OYLQbL9u” target=”_blank”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbrv-rce-OYLQbL9u</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20753

Related:

  • No Related Posts