News

Cisco patched routers, WSA and conferencing software

This week, Cisco Systems released another set of patches. It patched routers, WSA and conferencing software, closing two dozen vulnerabilities.

The danger level of 12 bugs is rated as high, the rest – as moderate.

The most serious problems are identified in the software of the RV series of routers for small business, the Web Security Appliance (WSA) security systems, as well as in the TelePresence product line. All of them received 8.8 points on the CVSS scale.

“The vulnerability CVE-2019-15271 in the RV016, RV042, RV042G, and RV082 routers allows, after authorization, to remotely execute any command with root privileges on the device. You can use this bug by submitting a maliciously crafted HTTP request to the web interface”, – indicated in the Cisco bulletin.

Users are advised to update the firmware to build 4.2.3.10.

Exploitation of vulnerability CVE-2019-15956 in Cisco WSA also requires authorization and is sent by sending a special HTTP request. If successful, the attacker could remotely cause a network reset, leading to a denial of service, or change the administrator password and gain privileged access to the device. In both scenarios, you will have to manually recover the system after the attack. Vulnerabilities are affected by WSA-complexes running AsyncOS branches 10.1, 10.5, 11.5 and 11.7. The problem will be solved by updating the software to the release 10.1.5-004, 11.5.3-016 or 11.7.1-006.

Read also: Researcher Discovered Two Critical Vulnerabilities in rConfig Utility

The vulnerability CVE-2019-15288 is present in the CLI utility included in the TelePresence Collaboration Endpoint (CE), TelePresence Codec (TC), and RoomOS packages. According to the developers, an authorized attacker can take advantage of the flaw by passing specific arguments when connecting to the device via SSH. (In TelePresence CE, TC, and RoomOS, SSH access is enabled by default.).

“Successful operation will allow the attacker to gain unlimited user level access to the limited shell of the vulnerable system”, – the bulletin said.

The patch is included with Cisco TelePresence CE Software 9.8.1 and Cisco TC Software 7.3.19, which can be downloaded from the company’s Download Center. RoomOS is also patched; No action is required from users of the Cisco Cloud Conference Service.

The remote code execution bug in Prime Infrastructure and Evolved Programmable Network Manager software (CVE-2019-15958) was rated at 8.1 points by CVSS, since it can only be used when registering a new device on the network and initial setup.

The remaining high-risk vulnerabilities received from 7.2 to 7.8 points. These are DoS bugs in wireless LAN, TelePresence CE and RoomOS controllers; the ability to implement commands in RV routers of five models (requires administrator rights) and multiple RCE vulnerabilities in Webex Windows players related to processing files in certain formats.

William Reddy

I am from Ireland. My parents bought me a computer when I was 11, and several month after I have got a virus on this PC. I decided to enter the INSA Centre Val de Loire university after being graduated from the school. This French educational institution was offering a brand-new cybersecurity course. After getting the master degree in cybersecurity, I've started working in as virus analyst in a little anti-malware vendor. In 2018, I've decided to start Virus Removal project. The main target of this site is to help people to deal with PC viruses of any kind.

Leave a Reply

Your email address will not be published. Required fields are marked *

Sending

Back to top button