2024. már. 27.
Riasztás
Cisco Access Point Software Denial of Service Vulnerability
A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input...
Tovább
2024. már. 27.
Riasztás
Cisco Access Point Software Secure Boot Bypass Vulnerability
A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device. This...
Tovább
2024. már. 27.
Riasztás
Cisco IOS XE Software Auxiliary Asynchronous Port Denial of Service Vulnerability
A vulnerability in auxiliary asynchronous port (AUX) functions of Cisco IOS XE Software could allow an authenticated, local attacker to cause an affected device to reload or stop responding. This vulnerability is due to the incorrect handling of...
Tovább
2024. már. 27.
Riasztás
Cisco Catalyst Center Authorization Bypass Vulnerability
A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to change specific data within the interface on an affected device. This vulnerability is due to...
Tovább
2024. már. 27.
Riasztás
Cisco IOS XE Software DHCP Snooping with Endpoint Analytics Denial of Service Vulnerability
A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to a...
Tovább
2024. már. 27.
Riasztás
Cisco IOS XE Software NETCONF/RESTCONF IPv4 Access Control List Bypass Vulnerability
A vulnerability in the data model interface (DMI) services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to access resources that should have been protected by a configured IPv4 access control list (ACL). This vulnerability...
Tovább