—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
Below is the list of Cisco Security Advisories published by Cisco PSIRT on 2020-September-02.
The following PSIRT security advisories (1 Critical, 4 High) were published at 16:00 UTC today.
Table of Contents:
1) Cisco Jabber for Windows Message Handling Arbitrary Code Execution Vulnerability – SIR: Critical
2) Cisco IOS XR Authenticated User Privilege Escalation Vulnerability – SIR: High
3) Cisco Jabber for Windows Protocol Handler Command Injection Vulnerability – SIR: High
4) Cisco Enterprise NFV Infrastructure Software File Overwrite Vulnerability – SIR: High
5) Cisco IOS XR Software Authenticated User Privilege Escalation Vulnerability – SIR: High
+——————————————————————–
1) Cisco Jabber for Windows Message Handling Arbitrary Code Execution Vulnerability
CVE-2020-3495
SIR: Critical
CVSS Score v(3.1): 9.9
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-UyTKCPGg [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-UyTKCPGg”]
+——————————————————————–
2) Cisco IOS XR Authenticated User Privilege Escalation Vulnerability
CVE-2020-3530
SIR: High
CVSS Score v(3.1): 8.4
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-cli-privescl-sDVEmhqv [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-cli-privescl-sDVEmhqv”]
+——————————————————————–
3) Cisco Jabber for Windows Protocol Handler Command Injection Vulnerability
CVE-2020-3430
SIR: High
CVSS Score v(3.1): 8.8
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-vY8M4KGB [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-vY8M4KGB”]
+——————————————————————–
4) Cisco Enterprise NFV Infrastructure Software File Overwrite Vulnerability
CVE-2020-3478
SIR: High
CVSS Score v(3.1): 8.1
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-file-overwrite-UONzPMkr [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-file-overwrite-UONzPMkr”]
+——————————————————————–
5) Cisco IOS XR Software Authenticated User Privilege Escalation Vulnerability
CVE-2020-3473
SIR: High
CVSS Score v(3.0): 7.8
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-LJtNFjeN [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-LJtNFjeN”]
—–BEGIN PGP SIGNATURE—–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=01b7
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com