—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
Below is the list of Cisco Security Advisories published by Cisco PSIRT on 2019-November-06.
The following PSIRT security advisories (8 High) were published at 16:00 UTC today.
Table of Contents:
1) Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerability – SIR: High
2) Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Command Injection Vulnerability – SIR: High
3) Cisco Web Security Appliance Unauthorized Device Reset Vulnerability – SIR: High
4) Cisco TelePresence Collaboration Endpoint and RoomOS Software Denial of Service Vulnerabilities – SIR: High
5) Cisco TelePresence Collaboration Endpoint, TelePresence Codec, and RoomOS Software Privilege Escalation Vulnerability – SIR: High
6) Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities – SIR: High
7) Cisco Small Business RV016, RV042, RV042G, and RV082 Routers Arbitrary Command Execution Vulnerability – SIR: High
8) Cisco Wireless LAN Controller HTTP Parsing Engine Denial of Service Vulnerability – SIR: High
+——————————————————————–
1) Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerability
CVE-2019-15958
SIR: High
CVSS Score v(3.0): 8.1
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-pi-epn-codex [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-pi-epn-codex”]
+——————————————————————–
2) Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Command Injection Vulnerability
CVE-2019-15957
SIR: High
CVSS Score v(3.0): 7.2
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbr-cominj [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbr-cominj”]
+——————————————————————–
3) Cisco Web Security Appliance Unauthorized Device Reset Vulnerability
CVE-2019-15956
SIR: High
CVSS Score v(3.0): 8.8
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset”]
+——————————————————————–
4) Cisco TelePresence Collaboration Endpoint and RoomOS Software Denial of Service Vulnerabilities
CVE-2019-15289
SIR: High
CVSS Score v(3.0): 7.5
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-dos”]
+——————————————————————–
5) Cisco TelePresence Collaboration Endpoint, TelePresence Codec, and RoomOS Software Privilege Escalation Vulnerability
CVE-2019-15288
SIR: High
CVSS Score v(3.0): 8.8
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-privesc [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-privesc”]
+——————————————————————–
6) Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities
CVE-2019-15283, CVE-2019-15284, CVE-2019-15285, CVE-2019-15286, CVE-2019-15287
SIR: High
CVSS Score v(3.0): 7.8
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-webex-player [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-webex-player”]
+——————————————————————–
7) Cisco Small Business RV016, RV042, RV042G, and RV082 Routers Arbitrary Command Execution Vulnerability
CVE-2019-15271
SIR: High
CVSS Score v(3.0): 8.8
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbrv-cmd-x [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbrv-cmd-x”]
+——————————————————————–
8) Cisco Wireless LAN Controller HTTP Parsing Engine Denial of Service Vulnerability
CVE-2019-15276
SIR: High
CVSS Score v(3.0): 7.7
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wlc-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wlc-dos”]
—–BEGIN PGP SIGNATURE—–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=U5qR
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com