{"id":5156,"date":"2018-03-13T08:40:37","date_gmt":"2018-03-13T07:40:37","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=5156"},"modified":"2022-06-25T17:06:58","modified_gmt":"2022-06-25T15:06:58","slug":"cisco-security-alert-updates-for-22-vulnerabilities-available","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/03\/13\/cisco-security-alert-updates-for-22-vulnerabilities-available\/","title":{"rendered":"Cisco Security Alert &ndash; Updates for 22 vulnerabilities available"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[German]Cisco has released 22 Security Advisories about vulnerabilities in several of its products. A couple of these vulnerabilities are classified as critical, others as high. <\/p>\n<p><!--more--><\/p>\n<p>All Security Advisories are published within <a href=\"https:\/\/tools.cisco.com\/security\/center\/publicationListing.x\" target=\"_blank\" rel=\"noopener\">Cisco-Security-Center<\/a>. Here are the entries up to March 9, 2018. <\/p>\n<h3>Critical security issues<\/h3>\n<ul>\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180221-ucdm\" target=\"_blank\" rel=\"noopener\">Cisco Unified Communications Domain Manager Remote Code Execution Vulnerability<\/a>, CVE-2018-0124<\/li>\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-cpcp\" target=\"_blank\" rel=\"noopener\">Cisco Prime Collaboration Provisioning Hard-Coded Password Vulnerability<\/a>; CVE-2018-0141<\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20210330010745\/https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-acs2\" target=\"_blank\" rel=\"noopener\">Cisco Secure Access Control System Java Deserialization Vulnerability<\/a>, CVE-2018-0147<\/li>\n<\/ul>\n<h3>High security issues<\/h3>\n<ul>\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-wsa\" target=\"_blank\" rel=\"noopener\">Cisco Web Security Appliance FTP Authentication Bypass Vulnerability<\/a>, CVE-2018-0087<\/li>\n<\/ul>\n<h3>Medium security issues<\/h3>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20201221000158\/https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180104-cpusidechannel\" target=\"_blank\" rel=\"noopener\">CPU Side-Channel Information Disclosure Vulnerabilities<\/a>, CVE-2017-5715\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-val\" target=\"_blank\" rel=\"noopener\">Cisco Videoscape AnyRes Live Cross-Site Scripting Vulnerability<\/a>, CVE-2018-0220\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-ucs\" target=\"_blank\" rel=\"noopener\">Cisco UCS Director Cross-Site Scripting Vulnerability<\/a>, CVE-2018-0219\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-staros1\" target=\"_blank\" rel=\"noopener\">Cisco StarOS CLI Command Injection Vulnerability<\/a>, CVE-2018-0224\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-staros\" target=\"_blank\" rel=\"noopener\">Cisco StarOS CLI Command Injection Vulnerability<\/a>, CVE-2018-0217\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-sm\" target=\"_blank\" rel=\"noopener\">Cisco Security Manager DesktopServlet Reflected Cross-Site Scripting Vulnerability<\/a>, CVE-2018-0223\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-res\" target=\"_blank\" rel=\"noopener\">Cisco Registered Envelope Service Cross-Site Scripting Vulnerability<\/a>, CVE-2018-0208\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-pdcnm\" target=\"_blank\" rel=\"noopener\">Cisco Prime Data Center Network Manager Cross-Site Scripting Vulnerability<\/a>, CVE-2018-0144\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-ise6\" target=\"_blank\" rel=\"noopener\">Cisco Identity Services Engine Command Injection to Underlying Operating System Vulnerability<\/a>, CVE-2018-0221\n<li><a href=\"https:\/\/web.archive.org\/web\/20210328080949\/https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-ise5\" target=\"_blank\" rel=\"noopener\">Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability<\/a>, CVE-2018-0216\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-ise4\" target=\"_blank\" rel=\"noopener\">Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability<\/a>, CVE-2018-0215\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-ise3\" target=\"_blank\" rel=\"noopener\">Cisco Identity Services Engine Local Command Injection Vulnerability<\/a>, CVE-2018-0214\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-ise2\" target=\"_blank\" rel=\"noopener\">Cisco Identity Services Engine Authenticated Privilege Escalation Vulnerability<\/a>, CVE-2018-0213\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-ise1\" target=\"_blank\" rel=\"noopener\">Cisco Identity Services Engine Cross-Site Scripting Vulnerability<\/a>, CVE-2018-0212\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-ise\" target=\"_blank\" rel=\"noopener\">Cisco Identity Services Engine Authenticated CLI Denial of Service Vulnerability<\/a>, CVE-2018-0211\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-dcnm\" target=\"_blank\" rel=\"noopener\">Cisco Data Center Network Manager Cross-Site Request Forgery Vulnerability<\/a>, CVE-2018-0210\n<li>Cisco Secure Access Control Server XML External Entity Injection Vulnerability, CVE-2018-0218\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-acs\" target=\"_blank\" rel=\"noopener\">Cisco Secure Access Control Server XML External Entity Injection Vulnerability<\/a>, CVE-2018-0207\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180307-550x\" target=\"_blank\" rel=\"noopener\">Cisco 550X Series Stackable Managed Switches SNMP Denial of Service Vulnerability<\/a>, CVE-2018-0209\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20170317-cmp\" target=\"_blank\" rel=\"noopener\">Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability<\/a>, CVE-2017-3881<\/li>\n<\/ul>\n<p>Further details may be obtained from the linked Security Advisories.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Cisco has released 22 Security Advisories about vulnerabilities in several of its products. A couple of these vulnerabilities are classified as critical, others as high.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22],"tags":[1248,69,195],"class_list":["post-5156","post","type-post","status-publish","format-standard","hentry","category-security","category-update","tag-cicsco","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=5156"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5156\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=5156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=5156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=5156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}