AKTUELLE CISCO SICHERHEITSLÜCKEN
Cisco hat aktuell diverse Security Advisories im Routing-Switching- bzw. Security-Bereich veröffentlicht:
You can find further information in the official Cisco Advisory by following this link:
- Cisco IR800 Integrated Services Router ROM Monitor Input Validation Vulnerability
- Cisco IOS and Cisco IOS XE Software IPv6 SNMP Message Handling Denial of Service Vulnerability
- Cisco IOS and Cisco IOS XE Software UDP Packet Processing Denial of Service Vulnerability
- Cisco Firepower Management Center Cross-Site Scripting Vulnerability CSCvc50771 (unauthenticated)
- Cisco Catalyst 4000 Series Switches Dynamic ACL Bypass Vulnerability
CISCO IR800 INTEGRATED SERVICES ROUTER ROM MONITOR INPUT VALIDATION VULNERABILITY
A vulnerability in the ROM Monitor (ROMMON) code of Cisco IR800 Integrated Services Router Software could allow an unauthenticated, local attacker to boot an unsigned Hypervisor on an affected device and compromise the integrity of the system. The vulnerability is due to insufficient sanitization of user input. An attacker who can access an affected router via the console could exploit this vulnerability by entering ROMMON mode and modifying ROMMON variables. A successful exploit could allow the attacker to execute arbitrary code and install a malicious version of Hypervisor firmware on an affected device. There are no workarounds that address this vulnerability.KNOWN AFFECTED RELEASES: | KNOWN FIXED RELEASES: |
|
|
15.6(1)T | 15.7(3.1.4A)OT |
15.7(0.2)M | |
15.6(3.0t)M | |
15.6(3)M1 |