techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#criticalvulnerability

0 posts0 participants0 posts today

🚨 Did you know? A command injection vulnerability could grant attackers root access to critical industrial systems, putting essential operations at risk! 😱

Our latest blog post explores Cisco’s critical CVE-2024-20418 vulnerability, which affects URWB Access Points. With no workarounds available, it’s a reminder of the importance of proactive patching and system updates in high-stakes environments.

🔐 Cyber Tip: Prioritize patch management in your network to avoid costly breaches. High-severity vulnerabilities, especially those impacting root access, should never be delayed.

What’s your experience with patching critical infrastructure? Let’s discuss!

Read more about this vulnerability here: guardiansofcyber.com/threats-v

"🚨 Critical Vulnerabilities Unveiled in Cisco Catalyst SD-WAN Manager 🚨"

Cisco Catalyst SD-WAN Manager has been found vulnerable to multiple critical security issues. Cisco has released software updates to address these vulnerabilities, but no workarounds are available.The severity of these issues is underscored by their high CVSS scores, with some reaching a base score of 9.8.

The vulnerabilities are diverse in nature, ranging from unauthorized access through improper authentication checks (CVE-2023-20252) to configuration rollback vulnerabilities (CVE-2023-20253) and information disclosure flaws (CVE-2023-20034). Additionally, there is a risk of authorization bypass (CVE-2023-20254) and denial of service through SSH service crashes (CVE-2023-20262). 🌐🔓

🔗 Source: Cisco Security Advisory

Tags: #Cisco #SDWAN #Vulnerability #Cybersecurity #InfoSec #NetworkSecurity #DoS #UnauthorizedAccess #CriticalVulnerability 🌐🔐🛡️

🔍 Vulnerability Details:

  • CVE-2023-20252: Unauthorized access due to improper authentication checks for SAML APIs. CVSS Score: 9.8 🚨
  • CVE-2023-20253: Unauthorized configuration rollback due to improper access control enforcement. CVSS Score: 8.4 ⚠️
  • CVE-2023-20034: Information disclosure due to improper access control for Elasticsearch. CVSS Score: 7.5 ⚠️
  • CVE-2023-20254: Authorization bypass vulnerability in the session management system. CVSS Score: 7.2 ⚠️
  • CVE-2023-20262: DoS vulnerability in the SSH service. CVSS Score: 5.3 🛑

Cisco has released software updates addressing these vulnerabilities, and no workarounds are available. Ensure to update your systems to safeguard against potential exploits. 🔄🛡️

CiscoCisco Security Advisory: Cisco Catalyst SD-WAN Manager VulnerabilitiesMultiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an attacker to access an affected instance or cause a denial of service (DoS) condition on an affected system. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z