You are here
Home > Preporuke > Ranjivosti više Cisco proizvoda

Ranjivosti više Cisco proizvoda

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Below is the list of Cisco Security Advisories published by Cisco PSIRT on 2019-November-06.

The following PSIRT security advisories (8 High) were published at 16:00 UTC today.

Table of Contents:

1) Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerability – SIR: High

2) Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Command Injection Vulnerability – SIR: High

3) Cisco Web Security Appliance Unauthorized Device Reset Vulnerability – SIR: High

4) Cisco TelePresence Collaboration Endpoint and RoomOS Software Denial of Service Vulnerabilities – SIR: High

5) Cisco TelePresence Collaboration Endpoint, TelePresence Codec, and RoomOS Software Privilege Escalation Vulnerability – SIR: High

6) Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities – SIR: High

7) Cisco Small Business RV016, RV042, RV042G, and RV082 Routers Arbitrary Command Execution Vulnerability – SIR: High

8) Cisco Wireless LAN Controller HTTP Parsing Engine Denial of Service Vulnerability – SIR: High

+——————————————————————–

1) Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerability

CVE-2019-15958

SIR: High

CVSS Score v(3.0): 8.1

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-pi-epn-codex [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-pi-epn-codex”]

+——————————————————————–

2) Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Command Injection Vulnerability

CVE-2019-15957

SIR: High

CVSS Score v(3.0): 7.2

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbr-cominj [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbr-cominj”]

+——————————————————————–

3) Cisco Web Security Appliance Unauthorized Device Reset Vulnerability

CVE-2019-15956

SIR: High

CVSS Score v(3.0): 8.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset”]

+——————————————————————–

4) Cisco TelePresence Collaboration Endpoint and RoomOS Software Denial of Service Vulnerabilities

CVE-2019-15289

SIR: High

CVSS Score v(3.0): 7.5

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-dos”]

+——————————————————————–

5) Cisco TelePresence Collaboration Endpoint, TelePresence Codec, and RoomOS Software Privilege Escalation Vulnerability

CVE-2019-15288

SIR: High

CVSS Score v(3.0): 8.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-privesc [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-privesc”]

+——————————————————————–

6) Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities

CVE-2019-15283, CVE-2019-15284, CVE-2019-15285, CVE-2019-15286, CVE-2019-15287

SIR: High

CVSS Score v(3.0): 7.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-webex-player [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-webex-player”]

+——————————————————————–

7) Cisco Small Business RV016, RV042, RV042G, and RV082 Routers Arbitrary Command Execution Vulnerability

CVE-2019-15271

SIR: High

CVSS Score v(3.0): 8.8

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbrv-cmd-x [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbrv-cmd-x”]

+——————————————————————–

8) Cisco Wireless LAN Controller HTTP Parsing Engine Denial of Service Vulnerability

CVE-2019-15276

SIR: High

CVSS Score v(3.0): 7.7

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wlc-dos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wlc-dos”]

—–BEGIN PGP SIGNATURE—–

iQJ5BAEBAgBjBQJdwvDbXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50
IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly
dEBjaXNjby5jb20+AAoJEJa12PPJBfczvTEP/0H7d0WLtwwhZF2UcD0W2LJ3yBGK
8+FYJ83MIUnrOgadDmH7Ms99wtJAMxgX6Q9SGfbB1Gd1yQb+KsblYE6jVSw34h/A
BM/9hYVHKzbpw+p8ZGusC5VvQiuUoGtDm0SboVQ+gXn7HpBrjxw1A0+pVRPj2zAN
jbYjkh2SKzCaqcYE1/HjD50sqa4Q8Odig7sTDDvZYNlB590pGam7R1bLeH721sC3
sUlxFcUaKwDQLDtGx3ugdEjffGeSofzA8pgdHB8iMif0TtWUuJQ3P+AtbwW6+Nnn
gnJ3d/k1+K0j3rjreFGU4f7FZJSc31/Pm8UXhi0byRLcbFHDlKxQeNBK2qrdlCBN
OrCpiIuesIlreBqvPhAMrngW1qsjt+pa8b2iMSXJ04WLSED6zFaHvPE1xPXc1Vd6
vj7yW8QAs6fkQ9SrphEs4rw7LA/iSg+xm6uIxla+aIgjkBY0epP383RXtc1nhJtP
jhavk8T3NfbzK5l11XoghRPTfNzu2wAhcOVLVWYrk6oGv/OrNGLfcS84/1DzmvIr
fWTnPgvizfZpvaCHSxddWpoc2OS317qhhkVr8GCrkyC3vMEf9ETxNmXw7w+CNkkB
FGaS5KDm61Zk/F3OWTs4kJoraaSVVgAZsBdAOExTzpRRrsgJMSd6zksO2Q/WAvNL
CYLwFdU3WLUzXst8
=U5qR
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa OpenSSL

Otkriveni su sigurnosni nedostaci u programskom paketu OpenSSL za operacijski sustav Gentoo. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju otkrivanje osjetljivih...

Close