Advisories address vulnerabilities in Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points, Nexus Dashboard Fabric Controller, and Enterprise Chat and Email
Summary
Advisories address vulnerabilities in Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points, Nexus Dashboard Fabric Controller, and Enterprise Chat and Email
Affected platforms
The following platforms are known to be affected:
The following platforms are also known to be affected:
Multiple other products are affected. Please see advisories below.
Threat details
Introduction
Cisco has released 15 security advisories addressing multiple vulnerabilities, including one critical and two high severity vulnerabilities affecting various products.
The critical vulnerability affects Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point, a software that uses wireless backhaul technology to connect appliances. The vulnerability enables command injection, which could allow an attacker to execute arbitrary commands with root privileges on the underlying operating system.
Two high severity vulnerabilities affect Cisco Enterprise Chat and Email, which offers a blended agent for handling of web chat, email and voice interactions, and Cisco Nexus Dashboard Fabric Controller, Cisco's network management platform for all Nexus Operating System enabled deployments. The vulnerabilities could allow an attacker to conduct a denial-of-service (DoS) attack, and read, modify, or delete arbitrary data on an internal database via an SQL injection.
Additionally, 12 medium severity advisories are outlined below.
Remediation advice
Affected organisations are encouraged to review Cisco's security advisories.
Remediation steps
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 7 November 2024 4:16 pm