You are currently viewing Cisco Releases Security Updates for Multiple Products

Cisco Releases Security Updates for Multiple Products

Cisco has released security updates to address critical, high, and medium severity vulnerabilities for twelve different Cisco products. Advisories released for Cisco Policy Suite and Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) are critical. On exploitation, some of these vulnerabilities allow unauthenticated, remote code execution with root privileges.


Cisco has released security updates for the following products:

  • Cisco Policy Suite
  • Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT)
  • Cisco Small Business Series Switches
  • Cisco Email Security Appliance
  • Cisco Webex Meetings
  • Cisco Webex Video Mesh
  • Cisco Umbrella
  • Cisco Small Business RV Series Routers
  • Cisco Prime Infrastructure and Evolved Programmable Network Manager
  • Cisco Unified Communications Products
  • Cisco Prime Access Registrar
  • Cisco AnyConnect Secure Mobility Client for Windows

Critical Severity Vulnerabilities

  • CVE-2021-40119: The flaw is found to be in the key-based SSH authentication mechanism of Cisco Policy Suite. The issue is due to the weakness in the SSH subsystem of an affected system. The affected device can exploit the bug through SSH. A successful exploit could allow the attacker to log in to an affected system as the root user.

  • CVE-2021-34795, CVE-2021-40112, CVE-2021-40113: Three vulnerabilities have been reported in the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT). On successful exploitation, these vulnerabilities could allow an unauthenticated, remote attacker to perform actions like login with a default credential if the Telnet protocol is enabled, performing command injection, and modifying the configuration.

High Severity Vulnerabilities

  • CVE-2021-34739: The vulnerability is found to be in the web-based management interface of multiple Cisco Small Business Series Switches. The issue is due to the insufficient expiration of session credentials. On successful exploitation, this vulnerability allows an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device.

  • CVE-2021-34741: A denial of service vulnerability present in the email scanning algorithm of Cisco AsyncOS Software for Cisco Email Security Appliance. The issue is due to insufficient input validation of incoming emails. The bug can be exploited by sending a crafted email through Cisco ESA. A successful exploit could lead to denial of service (DoS).

Medium Severity Vulnerabilities

Cisco’s fixes included 12 medium severity vulnerabilities:

CVE-2021-40128, CVE-2021-1500, CVE-2021-40115, CVE-2021-40126, CVE-2021-34773, CVE-2021-40127, CVE-2021-40120, CVE-2021-34784, CVE-2021-34701, CVE-2021-34774, CVE-2021-34731 and  CVE-2021-40124.


Impact

An attacker can exploit these vulnerabilities to execute arbitrary codes and commands with root privileges, privilege escalation, denial of services, directory traversal attacks on the vulnerable systems.


Solution

We recommend installing the necessary Cisco security updates in November 2021 as soon as possible to stay protected.

Subscribe For More Posts Like This

Get the latest research, best practices, industry trends and cybersecurity blogs from SecPod security experts

Invalid email address
We promise not to spam you. You can unsubscribe at any time.
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments