Cisco IOS XE Multiple Vulnerabilities
Last Update Date:
28 Sep 2020 10:32
Release Date:
28 Sep 2020
5354
Views
RISK: Medium Risk
TYPE: Clients - Productivity Products
Multiple vulnerabilities were identified in Cisco products, a remote attacker could exploit some of these vulnerabilities to trigger denial of service, elevation of privilege, remote code execution and sensitive information disclosure on the targeted system.
Impact
- Denial of Service
- Elevation of Privilege
- Remote Code Execution
- Information Disclosure
System / Technologies affected
- Cisco IOS XE
Please refer to the link below for detail:
https://tools.cisco.com/security/center/publicationListing.x
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor:
https://tools.cisco.com/security/center/publicationListing.x
Vulnerability Identifier
- CVE-2020-3414
- CVE-2020-3407
- CVE-2020-3475
- CVE-2020-3474
- CVE-2020-3509
- CVE-2020-3422
- CVE-2020-3465
- CVE-2020-3503
- CVE-2020-3480
- CVE-2020-3421
- CVE-2020-3476
- CVE-2020-3404
- CVE-2020-3403
- CVE-2020-3423
- CVE-2020-3417
- CVE-2020-3526
Source
Related Link
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ISR4461-gKKUROhx
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confacl-HbPtfSuO
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-webui-multi-vfTkk7yr
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-dhcp-dos-JSCKX43h
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-jw2DJmSv
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-le-drTOB625
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-unauth-file-access-eBTWkKVW
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-94ckG4G
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-file-overwrite-Ynu5PrJD
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cmdinj-2MzhjM6K
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ctbypass-7QHAfHkK
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xbace-OnCEbyS
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lua-rce-7VeJX4f
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-COPS-VLD-MpbTvGEW
- https://www.auscert.org.au/bulletins/ESB-2020.3306/
- https://www.auscert.org.au/bulletins/ESB-2020.3305/
- https://www.auscert.org.au/bulletins/ESB-2020.3304/
- https://www.auscert.org.au/bulletins/ESB-2020.3303/
- https://www.auscert.org.au/bulletins/ESB-2020.3302/
- https://www.auscert.org.au/bulletins/ESB-2020.3301/
- https://www.auscert.org.au/bulletins/ESB-2020.3300/
- https://www.auscert.org.au/bulletins/ESB-2020.3298/
- https://www.auscert.org.au/bulletins/ESB-2020.3297/
- https://www.auscert.org.au/bulletins/ESB-2020.3296/
- https://www.auscert.org.au/bulletins/ESB-2020.3299/
- https://www.auscert.org.au/bulletins/ESB-2020.3293/
Share with