You are here
Home > Preporuke > Ranjivost Cisco Small Business uređaja

Ranjivost Cisco Small Business uređaja

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

Undocumented Test Interface in Cisco Small Business Devices

Advisory ID: cisco-sa-20140110-sbd

Revision 1.0

For Public Release 2014 January 10 16:00 UTC (GMT)
+———————————————————————

Summary
=======

A vulnerability in the Cisco WAP4410N Wireless-N Access Point, Cisco WRVS4400N Wireless-N Gigabit Security Router, and the Cisco RVS4000 4-port Gigabit Security Router could allow an unauthenticated, remote attacker to gain root-level access to an affected device.

Cisco will release free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are not available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd
—–BEGIN PGP SIGNATURE—–
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools – http://gpgtools.org

iF4EAREIAAYFAlLQN78ACgkQUddfH3/BbTqu+wD/eWfAdt6H8ltKyHE4DT8SkTPM
j08MEAnhmkmuHjXSuwEA/0VbbYIOr1mqoOJEUbF3aFw7Veacwgk555uevEeC1/9b
=V3bU
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Ranjivost programskog paketa srtp

Otkrivena je ranjivost preljeva spremnika u SRTP protokolu. Ranjivost se očitovala načinom kojim je funkcija "crypto_policy_set_from_profile_for_rtp()" primjenjivala kriptografske profile prema...

Close