Cisco has issued another set of repairs for many of its products, including its SD-WAN and DNA Center solutions, its Email Security Appliance, Security Manager, SOHO routers/firewalls, and more.

CVE-2019-1625 could let a genuine, local assailant to raise lower-level rights to the root user on a device running a susceptible version of the Cisco SD-WAN Solution.

CVE-2019-1848 hits Cisco Digital Network Architecture (DNA) Center, a devoted physical application for dealing and controlling enterprise networks based on the Cisco DNA.

The susceptibility could let an unverified, end-to-end attacker to avoid verification and access serious internal services. It affects Cisco DNA Center Software releases before 1.3.

None of these faults is known to be exploited in the wild.

Proprietors of Cisco’s wireless VPN firewall and routers (RV110W, RV130W, and RV215W) for homes and small offices are also advised to inform to close a high-risk DoS susceptibility in the devices’ web-based management interface (CVE-2019-1843) and three supplementary faults of medium severity.

Attackers often target these three devices, but fortunately this time, the faults are not that operative to most attackers and no PoC exploit code is on hand.

Most of the other susceptibilities fixed in this batch of updates are medium risk, so users can take their time executing them.

Leave a Reply

Your email address will not be published. Required fields are marked *