—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
Below is the list of Cisco Security Advisories published by Cisco PSIRT on 2021-January-13.
The following PSIRT security advisories (4 High) were published at 16:00 UTC today.
Table of Contents:
1) Cisco AnyConnect Secure Mobility Client for Windows DLL Injection Vulnerability – SIR: High
2) Cisco Connected Mobile Experiences Privilege Escalation Vulnerability – SIR: High
3) Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Command Injection Vulnerabilities – SIR: High
4) Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities – SIR: High
+——————————————————————–
1) Cisco AnyConnect Secure Mobility Client for Windows DLL Injection Vulnerability
CVE-2021-1237
SIR: High
CVSS Score v(3.1): 7.8
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-injec-pQnryXLf [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-injec-pQnryXLf”]
+——————————————————————–
2) Cisco Connected Mobile Experiences Privilege Escalation Vulnerability
CVE-2021-1144
SIR: High
CVSS Score v(3.1): 8.8
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmxpe-75Asy9k [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmxpe-75Asy9k”]
+——————————————————————–
3) Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Command Injection Vulnerabilities
CVE-2021-1146, CVE-2021-1147, CVE-2021-1148, CVE-2021-1149, CVE-2021-1150
SIR: High
CVSS Score v(3.1): 7.2
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-command-inject-LBdQ2KRN [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-sa-rv-command-inject-LBdQ2KRN”]
+——————————————————————–
4) Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities
CVE-2021-1159, CVE-2021-1160, CVE-2021-1161, CVE-2021-1162, CVE-2021-1163, CVE-2021-1164, CVE-2021-1165, CVE-2021-1166, CVE-2021-1167, CVE-2021-1168, CVE-2021-1169, CVE-2021-1170, CVE-2021-1171, CVE-2021-1172, CVE-2021-1173, CVE-2021-1174, CVE-2021-1175, CVE-2021-1176, CVE-2021-1177, CVE-2021-1178, CVE-2021-1179, CVE-2021-1180, CVE-2021-1181, CVE-2021-1182, CVE-2021-1183, CVE-2021-1184, CVE-2021-1185, CVE-2021-1186, CVE-2021-1187, CVE-2021-1188, CVE-2021-1189, CVE-2021-1190, CVE-2021-1191, CVE-2021-1192, CVE-2021-1193, CVE-2021-1194, CVE-2021-1195, CVE-2021-1196, CVE-2021-1197, CVE-2021-1198, CVE-2021-1199, CVE-2021-1200, CVE-2021-1201, CVE-2021-1202, CVE-2021-1203, CVE-2021-1204, CVE-2021-1205, CVE-2021-1206, CVE-2021-1207, CVE-2021-1208, CVE-2021-1209, CVE-2021-1210, CVE-2021-1211, CVE-2021-1212, CVE-2021-1213, CVE-2021-1214, CVE-2021-1215, CVE-2021-1216, CVE-2021-1217, CVE-2021-1307, CVE-2021-1360
SIR: High
CVSS Score v(3.1): 7.2
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-sa-rv-overflow-WUnUgv4U”]
—–BEGIN PGP SIGNATURE—–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=OGQF
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com