A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site

Alerts

Qualcomm Security Update

Qualcomm has released security updates to address vulnerabilities in multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system.

Users and administrators are encouraged to review Qualcomm Security Advisory and apply necessary updates.

Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager (CVE-2023-20034, CVE-2023-20252, CVE-2023-20253, CVE-2023-20254, CVE-2023-20262)

Advisory No: TZCERT/SA/2023/09/28

Date of First Release: 28th September 2023

Source: CISCO

Software Affected:  Cisco Catalyst SD-WAN Manager

Overview:

Multiple independent vulnerabilities have been identified to affect multiple components in a Cisco device. These independent vulnerabilities which do not require exploitation of another vulnerability to be exploited may allow an attacker to compromise the confidentiality and availability of the affected system.

Description:

CVE-2023-20252: A vulnerability in the Security Assertion Markup Language (SAML) APIs of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain unauthorized access to the application as an arbitrary user.

CVE-2023-20253: A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker with read-only privileges to bypass authorization and roll back controller configurations, which could then be deployed to the downstream routers.

CVE-2023-20034: A vulnerability in the access control implementation for Elasticsearch could allow the attacker to view the Elasticsearch database content as the Elasticsearch user.

CVE-2023-20254: A vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant due to insufficient user session management allowing the attacker to access information about another tenant, make configuration changes, or possibly take a tenant offline and cause a DoS condition.

CVE-2023-20262: A vulnerability in the SSH service of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to cause a process crash, resulting in a DoS condition for SSH access only.

Impact:

Successful exploitation of this vulnerability may allow the attacker to gain unauthorized access or cause a denial of service (DoS) condition.

Solution:

Cisco has released patches for these vulnerabilities. Users and administrators are encouraged to apply all necessary updates.

References:

  1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z

Cisco Security Update

Cisco has released security updates to address vulnerabilities in its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system.

Users and administrators are encouraged to review Cisco Security Advisories dated 27th September 2023 and apply necessary updates.

SUSE Security Update

SUSE has released security updates to address vulnerabilities in multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system.

Users and administrators are encouraged to review SUSE Security Advisories dated 27th September 2023 and apply necessary updates.

Mozilla Security Update

Mozilla has released security updates to address vulnerabilities in thunderbird, firefox and firefox esr. Exploitation of these vulnerabilities may allow an attacker to take control of affected system.

Users and administrators are encouraged to review Mozilla Security Advisories mfsa2023-43, mfsa2023-41 and mfsa2023-42 and apply necessary updates.