CERT mailing list archives

Cisco Releases Security Updates


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Thu, 07 Nov 2019 12:19:22 -0600

Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:



Cisco Releases Security Updates [ 
https://www.us-cert.gov/ncas/current-activity/2019/11/07/cisco-releases-security-updates ] 11/07/2019 11:34 AM EST 
Original release date: November 7, 2019

Cisco has released security updates to address vulnerabilities in Cisco products. A remote attacker could exploit some 
of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities 
see the Cisco Security Advisories webpage [ https://tools.cisco.com/security/center/publicationListing.x ].

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the following 
Cisco advisories and apply the necessary updates:


  * Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-pi-epn-codex ] 
  * Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Command Injection Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbr-cominj ] 
  * Cisco TelePresence Collaboration Endpoint and RoomOS Software Denial of Service Vulnerabilities [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-dos ] 
  * Cisco TelePresence Collaboration Endpoint, TelePresence Codec, and RoomOS Software Privilege Escalation 
Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-telepres-roomos-privesc ] 
  * Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-webex-player ] 
  * Cisco Wireless LAN Controller HTTP Parsing Engine Denial of Service Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wlc-dos ] 
  * Cisco Web Security Appliance Unauthorized Device Reset Vulnerability [ 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-wsa-unauth-devreset ] 

This product is provided subject to this Notification [ https://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ https://www.dhs.gov/privacy-policy ] policy.

body { font-size: 1em; font-family: Arial, Verdana, sans-serif; font-weight: normal; font-style: normal; color: 
#333333; } ________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ]  

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: