Telegram Group Search
Cisco Integrated Management Controller Web-Based Management Interface Command Injection Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/CiscoChannel/com.cisco-sa-cimc-cmd-inj-bLuPcb?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Integrated%20Management%20Controller%20Web-Based%20Management%20Interface%20Command%20Injection%20Vulnerability&vs_k=1

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root.
This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/CiscoChannel/com.cisco-sa-cimc-cmd-inj-bLuPcb


Security Impact Rating: High



CVE: CVE-2024-20356
Cisco IOS and IOS XE Software SNMP Extended Named Access Control List Bypass Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/CiscoChannel/com.cisco-sa-snmp-uwBXfqww?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20IOS%20and%20IOS%20XE%20Software%20SNMP%20Extended%20Named%20Access%20Control%20List%20Bypass%20Vulnerability&vs_k=1

A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic. 
This vulnerability exists because Cisco IOS Software and Cisco IOS XE Software do not support extended IPv4 ACLs for SNMP, but they do allow administrators to configure extended named IPv4 ACLs that are attached to the SNMP server configuration without a warning message. This can result in no ACL being applied to the SNMP listening process. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP operations that should be denied. The attacker has no control of the SNMP ACL configuration and would still need a valid SNMP version 2c (SNMPv2c) community string or SNMP version 3 (SNMPv3) user credentials.
SNMP with IPv6 ACL configurations is not affected.
For more information, see the Details (https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/CiscoChannel/com.cisco-sa-snmp-uwBXfqww?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20IOS%20and%20IOS%20XE%20Software%20SNMP%20Extended%20Named%20Access%20Control%20List%20Bypass%20Vulnerability&vs_k=1#details) section of this advisory.

Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/CiscoChannel/com.cisco-sa-snmp-uwBXfqww


Security Impact Rating: Medium



CVE: CVE-2024-20373
Cisco Integrated Management Controller CLI Command Injection Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/CiscoChannel/com.cisco-sa-cimc-cmd-inj-mUx4c5AJ?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Integrated%20Management%20Controller%20CLI%20Command%20Injection%20Vulnerability&vs_k=1

A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root. 

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/CiscoChannel/com.cisco-sa-cimc-cmd-inj-mUx4c5AJ


Security Impact Rating: High



CVE: CVE-2024-20295
Introducing Cisco Hypershield, a cloud-native approach to highly-distributed security for data centers that’s AI-powered and built into the fabric of the network.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Given the challenges of today’s threat landscape, nothing less than a radical rethinking of security will do. Cisco Hypershield is it.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Cisco today unveiled a radically new approach to securing data centers and clouds in response to the increasing demands of the AI revolution
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
IT can play a critical role in driving sustainability for their organizations — and beyond. Cisco can help.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Cisco and Morgan Solar have announced a pilot project to power collaboration and meeting spaces with solar energy.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
🙌🌟💥 Great Bonus for VIP channel memebrs!!! Don't Miss this chance to enhance IT skills & be Cisco Network Engineer 2024!!!

📚Newly launched FREE #Cisco CCNA CCNP Networking Study Materials *in one click only👇*

Networking eBooks
Command Notes
Cisco official guides
Practice Tests

🔗👉Download Free #Cisco ONE-STOP resources: https://bit.ly/3VOFVAl

🔗 Free Cisco #CCNA 200-301 Training Courses https://bit.ly/3vF5idk

Join Cisco study Group for more: https://www.tg-me.com/spotociscoclub
https://chat.whatsapp.com/BX4ZpXvwvSW4Gv10lN9vux
2024/04/23 11:47:30
Back to Top
HTML Embed Code: