Refine your search
6 vulnerabilities found for SD-WAN vManage by Cisco
CERTFR-2022-AVI-806
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Cisco | SD-WAN vManage | Cisco SD-WAN vManage versions antérieures à 20.6.4 | ||
Cisco | N/A | Adaptive Security Virtual Appliance (ASAv) versions 9.17.x antérieures à 9.17.1 (disponible à une date ultérieure) | ||
Cisco | N/A | Secure Firewall Threat Defense Virtual (formerly FTDv) versions 7.2.x | ||
Cisco | N/A | Secure Firewall Threat Defense Virtual (formerly FTDv) versions 7.1.x | ||
Cisco | SD-WAN vManage | Cisco SD-WAN vManage versions 20.7.x à 20.9.x antérieures à 20.9.1 | ||
Cisco | N/A | Cisco Catalyst 8000V Edge versions 17.7.x antérieures à 17.7.2 | ||
Cisco | N/A | Cisco Catalyst 8000V Edge versions 17.8.x antérieures à 17.9.1 | ||
Cisco | N/A | Adaptive Security Virtual Appliance (ASAv) versions 9.18.x antérieures à 9.18.2 | ||
Cisco | N/A | Cisco Catalyst 8000V Edge versions 17.6.x antérieures à 17.6.4 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Cisco SD-WAN vManage versions ant\u00e9rieures \u00e0 20.6.4", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Adaptive Security Virtual Appliance (ASAv) versions 9.17.x ant\u00e9rieures \u00e0 9.17.1 (disponible \u00e0 une date ult\u00e9rieure)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Secure Firewall Threat Defense Virtual (formerly FTDv) versions 7.2.x", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Secure Firewall Threat Defense Virtual (formerly FTDv) versions 7.1.x", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vManage versions 20.7.x \u00e0 20.9.x ant\u00e9rieures \u00e0 20.9.1", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Catalyst 8000V Edge versions 17.7.x ant\u00e9rieures \u00e0 17.7.2", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Catalyst 8000V Edge versions 17.8.x ant\u00e9rieures \u00e0 17.9.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Adaptive Security Virtual Appliance (ASAv) versions 9.18.x ant\u00e9rieures \u00e0 9.18.2", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Catalyst 8000V Edge versions 17.6.x ant\u00e9rieures \u00e0 17.6.4", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-28199", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28199" }, { "name": "CVE-2022-20696", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20696" } ], "initial_release_date": "2022-09-08T00:00:00", "last_revision_date": "2022-09-08T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-806", "revisions": [ { "description": "Version initiale", "revision_date": "2022-09-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-mlx5-jbPCrqD8 du 07 septembre 2022", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlx5-jbPCrqD8" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-vmanage-msg-serv-AqTup7vs du 07 septembre 2022", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-msg-serv-AqTup7vs" } ] }
CERTFR-2022-AVI-060
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Cisco | ConfD | ConfD versions 6.4.x antérieures à 6.4.7.2 et 6.4.8 | ||
Cisco | Firepower Threat Defense | Cisco Firepower Threat Defense (FTD) Software versions antérieures à 6.4.13 | ||
Cisco | N/A | Cybervision Software versions antérieures à 4.0.2 | ||
Cisco | IOS XR | Cisco IOS XR (64-bit) Software versions antérieures à 7.0.2, 7.1.1 | ||
Cisco | N/A | Cisco Virtual Topology System (VTS) versions antérieures à 2.6.5 | ||
Cisco | N/A | Cisco SD-WAN vEdge Routers versions antérieures à 18.4.4, 19.2.1, 19.3.0, 20.1.1 | ||
Cisco | N/A | Cisco Carrier Packet Transport toutes versions (aucun correctif ne sera publié car le produit est en fin de vie) | ||
Cisco | N/A | Cisco Enterprise NFV Infrastructure Software (NFVIS) versions antérieures à 3.12.1 | ||
Cisco | ConfD | ConfD versions 6.7.x antérieures à 6.7.1 | ||
Cisco | N/A | Cisco SD-WAN vSmart Software versions antérieures à 18.4.4, 19.2.1, 19.3.0, 20.1.1 | ||
Cisco | ConfD | ConfD versions antérieures à 6.3.9.1 | ||
Cisco | Firepower Threat Defense | Cisco Firepower Threat Defense (FTD) Software versions 6.7.x et 7.0.x antérieures à 7.0.1 | ||
Cisco | N/A | Cisco Network Services Orchestrator (NSO) versions antérieures à 4.3.9.1, 4.4.5.6, 4.4.8, 4.5.7, 4.6.1.7, 4.6.2, 4.7.1, 5.1.0.1, 5.2 | ||
Cisco | ConfD | ConfD versions 6.6.x antérieures à 6.6.2 | ||
Cisco | SD-WAN vManage | Cisco SD-WAN vManage Software versions antérieures à 18.4.4, 19.2.1, 19.3.0, 20.1.1 | ||
Cisco | N/A | Cisco Ultra Gateway Platform versions antérieures à 6.15.0 | ||
Cisco | IOS XE | Cisco IOS XE SD-WAN versions antérieures à 16.10.2, 16.12.1b, 17.2.1r | ||
Cisco | Meraki MX | Meraki MX Series Software toutes versions | ||
Cisco | N/A | Cisco SD-WAN vBond Software versions antérieures à 18.4.4, 19.2.1, 19.3.0, 20.1.1 | ||
Cisco | Firepower Threat Defense | Cisco Firepower Threat Defense (FTD) Software versions 6.5.x et 6.6.x antérieures à 6.6.5.1 | ||
Cisco | N/A | Cisco RCM pour StarOS versions antérieures à 21.25.4 | ||
Cisco | N/A | Cisco Network Convergence System (NCS) 4009, 4016 versions antérieures à 6.5.32 | ||
Cisco | ConfD | ConfD versions 6.5.x antérieures à 6.5.7 |
Title | Publication Time | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "ConfD versions 6.4.x ant\u00e9rieures \u00e0 6.4.7.2 et 6.4.8", "product": { "name": "ConfD", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Firepower Threat Defense (FTD) Software versions ant\u00e9rieures \u00e0 6.4.13", "product": { "name": "Firepower Threat Defense", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cybervision Software versions ant\u00e9rieures \u00e0 4.0.2", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco IOS XR (64-bit) Software versions ant\u00e9rieures \u00e0 7.0.2, 7.1.1", "product": { "name": "IOS XR", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Virtual Topology System (VTS) versions ant\u00e9rieures \u00e0 2.6.5", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vEdge Routers versions ant\u00e9rieures \u00e0 18.4.4, 19.2.1, 19.3.0, 20.1.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Carrier Packet Transport toutes versions (aucun correctif ne sera publi\u00e9 car le produit est en fin de vie)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Enterprise NFV Infrastructure Software (NFVIS) versions ant\u00e9rieures \u00e0 3.12.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "ConfD versions 6.7.x ant\u00e9rieures \u00e0 6.7.1", "product": { "name": "ConfD", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vSmart Software versions ant\u00e9rieures \u00e0 18.4.4, 19.2.1, 19.3.0, 20.1.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "ConfD versions ant\u00e9rieures \u00e0 6.3.9.1", "product": { "name": "ConfD", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Firepower Threat Defense (FTD) Software versions 6.7.x et 7.0.x ant\u00e9rieures \u00e0 7.0.1", "product": { "name": "Firepower Threat Defense", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Network Services Orchestrator (NSO) versions ant\u00e9rieures \u00e0 4.3.9.1, 4.4.5.6, 4.4.8, 4.5.7, 4.6.1.7, 4.6.2, 4.7.1, 5.1.0.1, 5.2", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "ConfD versions 6.6.x ant\u00e9rieures \u00e0 6.6.2", "product": { "name": "ConfD", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vManage Software versions ant\u00e9rieures \u00e0 18.4.4, 19.2.1, 19.3.0, 20.1.1", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Ultra Gateway Platform versions ant\u00e9rieures \u00e0 6.15.0", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco IOS XE SD-WAN versions ant\u00e9rieures \u00e0 16.10.2, 16.12.1b, 17.2.1r", "product": { "name": "IOS XE", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Meraki MX Series Software toutes versions", "product": { "name": "Meraki MX", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vBond Software versions ant\u00e9rieures \u00e0 18.4.4, 19.2.1, 19.3.0, 20.1.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Firepower Threat Defense (FTD) Software versions 6.5.x et 6.6.x ant\u00e9rieures \u00e0 6.6.5.1", "product": { "name": "Firepower Threat Defense", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco RCM pour StarOS versions ant\u00e9rieures \u00e0 21.25.4", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Network Convergence System (NCS) 4009, 4016 versions ant\u00e9rieures \u00e0 6.5.32", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "ConfD versions 6.5.x ant\u00e9rieures \u00e0 6.5.7", "product": { "name": "ConfD", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-20649", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20649" }, { "name": "CVE-2022-20655", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20655" }, { "name": "CVE-2022-20648", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20648" }, { "name": "CVE-2022-20685", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20685" } ], "initial_release_date": "2022-01-20T00:00:00", "last_revision_date": "2022-01-21T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-060", "revisions": [ { "description": "Version initiale", "revision_date": "2022-01-20T00:00:00.000000" }, { "description": "Ajout de la CVE-2022-20648", "revision_date": "2022-01-21T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cli-cmdinj-4MttWZPB du 19 janvier 2022", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-snort-dos-9D3hJLuj du 19 janvier 2022", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-confdcli-cmdinj-wybQDSSh du 19 janvier 2022", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-rcm-vuls-7cS3Nuq du 19 janvier 2022", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-vuls-7cS3Nuq" } ] }
CERTFR-2021-AVI-350
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Cisco | N/A | Cisco SD-WAN vEdge Cloud Routers versions antérieures à 20.4.1 ou 20.5.1 | ||
Cisco | N/A | Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE versions antérieures à 1.0.4.3 | ||
Cisco | N/A | Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE versions antérieures à 1.1.3.2 | ||
Cisco | N/A | Cisco WAP351 Wireless-N Dual Radio Access Point with 5-Port Switch1 toutes versions (produit en fin de vie, ne recevra pas de correctif) | ||
Cisco | N/A | Cisco WAP131 Wireless-N Dual Radio Access Point with PoE 1 toutes versions (produit en fin de vie, ne recevra pas de correctif) | ||
Cisco | N/A | Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point with 2.5GbE LAN versions antérieures à 1.0.4.4 | ||
Cisco | N/A | Cisco AnyConnect Secure Mobility Client pour Windows versions antérieures à 4.10.00093 | ||
Cisco | N/A | Cisco Enterprise NFV Infrastructure Software (NFVIS) versions antérieures à 4.5.1 | ||
Cisco | N/A | Cisco HyperFlex HX Software versions antérieures à 4.0(2e) ou 4.5(1b) 4.5(2a) | ||
Cisco | Unified Communications Manager | Cisco Unified Communications Manager IM & Presence Service versions antérieures à 11.5(1)SU9 | ||
Cisco | N/A | Cisco SD-WAN vSmart Controller Software versions antérieures à 20.4.1 ou 20.5.1 | ||
Cisco | N/A | Cisco SD-WAN vEdge Routers versions antérieures à 20.4.1 ou 20.5.1 | ||
Cisco | SD-WAN vManage | Cisco SD-WAN vManage Software versions antérieures à 20.4.1 ou 20.5.1 | ||
Cisco | IOS XE | IOS XE SD-WAN Software toutes versions | ||
Cisco | Unified Communications Manager | Cisco Unified Communications Manager IM & Presence Service versions 12.x antérieures à 12.5(1)SU4 | ||
Cisco | N/A | Cisco SD-WAN vBond Orchestrator Software versions antérieures à 20.4.1 ou 20.5.1 | ||
Cisco | N/A | Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE versions antérieures à 1.1.3.2 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Cisco SD-WAN vEdge Cloud Routers versions ant\u00e9rieures \u00e0 20.4.1 ou 20.5.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE versions ant\u00e9rieures \u00e0 1.0.4.3", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE versions ant\u00e9rieures \u00e0 1.1.3.2", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco WAP351 Wireless-N Dual Radio Access Point with 5-Port Switch1 toutes versions (produit en fin de vie, ne recevra pas de correctif)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco WAP131 Wireless-N Dual Radio Access Point with PoE 1 toutes versions (produit en fin de vie, ne recevra pas de correctif)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point with 2.5GbE LAN versions ant\u00e9rieures \u00e0 1.0.4.4", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco AnyConnect Secure Mobility Client pour Windows versions ant\u00e9rieures \u00e0 4.10.00093", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Enterprise NFV Infrastructure Software (NFVIS) versions ant\u00e9rieures \u00e0 4.5.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco HyperFlex HX Software versions ant\u00e9rieures \u00e0 4.0(2e) ou 4.5(1b) 4.5(2a)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Unified Communications Manager IM \u0026 Presence Service versions ant\u00e9rieures \u00e0 11.5(1)SU9", "product": { "name": "Unified Communications Manager", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vSmart Controller Software versions ant\u00e9rieures \u00e0 20.4.1 ou 20.5.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vEdge Routers versions ant\u00e9rieures \u00e0 20.4.1 ou 20.5.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vManage Software versions ant\u00e9rieures \u00e0 20.4.1 ou 20.5.1", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "IOS XE SD-WAN Software toutes versions", "product": { "name": "IOS XE", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Unified Communications Manager IM \u0026 Presence Service versions 12.x ant\u00e9rieures \u00e0 12.5(1)SU4", "product": { "name": "Unified Communications Manager", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vBond Orchestrator Software versions ant\u00e9rieures \u00e0 20.4.1 ou 20.5.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE versions ant\u00e9rieures \u00e0 1.1.3.2", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-1430", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1430" }, { "name": "CVE-2021-1428", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1428" }, { "name": "CVE-2021-1275", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1275" }, { "name": "CVE-2021-1468", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1468" }, { "name": "CVE-2021-1365", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1365" }, { "name": "CVE-2021-1497", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1497" }, { "name": "CVE-2021-1426", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1426" }, { "name": "CVE-2021-1510", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1510" }, { "name": "CVE-2021-1508", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1508" }, { "name": "CVE-2021-1513", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1513" }, { "name": "CVE-2021-1401", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1401" }, { "name": "CVE-2021-1429", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1429" }, { "name": "CVE-2021-1505", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1505" }, { "name": "CVE-2021-1363", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1363" }, { "name": "CVE-2021-1509", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1509" }, { "name": "CVE-2021-1498", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1498" }, { "name": "CVE-2021-1427", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1427" }, { "name": "CVE-2021-1421", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1421" }, { "name": "CVE-2021-1284", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1284" }, { "name": "CVE-2021-1511", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1511" }, { "name": "CVE-2021-1506", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1506" }, { "name": "CVE-2021-1400", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1400" }, { "name": "CVE-2021-1496", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1496" } ], "initial_release_date": "2021-05-06T00:00:00", "last_revision_date": "2021-06-15T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-350", "revisions": [ { "description": "Version initiale", "revision_date": "2021-05-06T00:00:00.000000" }, { "description": "Correction de la version 4.5 non vuln\u00e9rable d\u0027HyperFlex HX.", "revision_date": "2021-06-15T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-anyconnect-code-exec-jR3tWTA6 du 05 mai 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sdw-auth-bypass-65aYqcS2 du 05 mai 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-auth-bypass-65aYqcS2" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sb-wap-multi-ZAfKGXhF du 05 mai 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sd-wan-vmanage-4TbynnhZ du 05 mai 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sdwan-dos-Ckn5cVqW du 05 mai 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dos-Ckn5cVqW" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-imp-inj-ereCOKjR du 05 mai 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-inj-ereCOKjR" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sdwan-buffover-MWGucjtO du 05 mai 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-hyperflex-rce-TjjNrkpR du 05 mai 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-rce-TjjNrkpR" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-nfvis-cmdinj-DkFjqg2j du 05 mai 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-cmdinj-DkFjqg2j" } ] }
CERTFR-2021-AVI-246
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Cisco | ClamAV | ClamAV pour Windows versions antérieures à 0.103.2 | ||
Cisco | Small Business | les routeurs Cisco Small Business RV110W, RV130, RV130W et RV215W (ces produits sont en fin de vie donc aucun correctif ne sera publié pour la vulnérabilité critique CVE-2021-1459) | ||
Cisco | N/A | Cisco Unified CM IM&P versions antérieures à 11.5(1)SU9 | ||
Cisco | Small Business | les routeurs Cisco Small Business RV134W versions antérieures à 1.0.1.21 | ||
Cisco | SD-WAN vManage | Cisco SD-WAN vManage versions 19.x et 20.x antérieures à 20.3.3 | ||
Cisco | SD-WAN vManage | Cisco SD-WAN vManage versions 20.4.x antérieures à 20.4.1 | ||
Cisco | N/A | Immunet versions antérieures à 7.4.0 | ||
Cisco | N/A | Cisco AMP for Endpoints pour Windows versions antérieures à 7.3.15 | ||
Cisco | Unity Connection | Cisco Unity Connection versions antérieures à 11.5(1)SU9 | ||
Cisco | Small Business | les routeurs Cisco Small Business RV132W versions antérieures à 1.0.1.15 | ||
Cisco | Unity Connection | Cisco Unity Connection versions 12.0.x et 12.5.x antérieures à 12.5(1)SU4 | ||
Cisco | Small Business | les routeurs Cisco Small Business RV160, RV160W, RV260, RV260P et RV260W versions antérieures à 1.0.01.03 | ||
Cisco | N/A | Cisco Unified CM IM&P versions 12.0.x et 12.5.x antérieures à 12.5(1)SU4 | ||
Cisco | N/A | Cisco Unified CM et Unified CM SME versions 12.0.x et 12.5.x antérieures à 12.5(1)SU4 | ||
Cisco | SD-WAN vManage | Cisco SD-WAN vManage versions antérieures à 19.2.4 | ||
Cisco | N/A | Cisco Unified CM et Unified CM SME versions antérieures à 11.5(1)SU9 | ||
Cisco | Small Business | les routeurs Cisco Small Business RV340, RV340W, RV345 et RV345P versions antérieures à 1.0.03.21 | ||
Cisco | N/A | Cisco Prime License Manager versions antérieures à 11.5(1)SU9 |
Title | Publication Time | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "ClamAV pour Windows versions ant\u00e9rieures \u00e0 0.103.2", "product": { "name": "ClamAV", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "les routeurs Cisco Small Business RV110W, RV130, RV130W et RV215W (ces produits sont en fin de vie donc aucun correctif ne sera publi\u00e9 pour la vuln\u00e9rabilit\u00e9 critique CVE-2021-1459)", "product": { "name": "Small Business", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Unified CM IM\u0026P versions ant\u00e9rieures \u00e0 11.5(1)SU9", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "les routeurs Cisco Small Business RV134W versions ant\u00e9rieures \u00e0 1.0.1.21", "product": { "name": "Small Business", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vManage versions 19.x et 20.x ant\u00e9rieures \u00e0 20.3.3", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vManage versions 20.4.x ant\u00e9rieures \u00e0 20.4.1", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Immunet versions ant\u00e9rieures \u00e0 7.4.0", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco AMP for Endpoints pour Windows versions ant\u00e9rieures \u00e0 7.3.15", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Unity Connection versions ant\u00e9rieures \u00e0 11.5(1)SU9", "product": { "name": "Unity Connection", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "les routeurs Cisco Small Business RV132W versions ant\u00e9rieures \u00e0 1.0.1.15", "product": { "name": "Small Business", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Unity Connection versions 12.0.x et 12.5.x ant\u00e9rieures \u00e0 12.5(1)SU4", "product": { "name": "Unity Connection", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "les routeurs Cisco Small Business RV160, RV160W, RV260, RV260P et RV260W versions ant\u00e9rieures \u00e0 1.0.01.03", "product": { "name": "Small Business", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Unified CM IM\u0026P versions 12.0.x et 12.5.x ant\u00e9rieures \u00e0 12.5(1)SU4", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Unified CM et Unified CM SME versions 12.0.x et 12.5.x ant\u00e9rieures \u00e0 12.5(1)SU4", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vManage versions ant\u00e9rieures \u00e0 19.2.4", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Unified CM et Unified CM SME versions ant\u00e9rieures \u00e0 11.5(1)SU9", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "les routeurs Cisco Small Business RV340, RV340W, RV345 et RV345P versions ant\u00e9rieures \u00e0 1.0.03.21", "product": { "name": "Small Business", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Prime License Manager versions ant\u00e9rieures \u00e0 11.5(1)SU9", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1473" }, { "name": "CVE-2021-1480", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1480" }, { "name": "CVE-2021-1479", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1479" }, { "name": "CVE-2021-1362", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1362" }, { "name": "CVE-2021-1309", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1309" }, { "name": "CVE-2021-1386", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1386" }, { "name": "CVE-2021-1472", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1472" }, { "name": "CVE-2021-1251", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1251" }, { "name": "CVE-2021-1459", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1459" }, { "name": "CVE-2021-1137", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1137" }, { "name": "CVE-2021-1308", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1308" } ], "initial_release_date": "2021-04-08T00:00:00", "last_revision_date": "2021-04-08T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-246", "revisions": [ { "description": "Version initiale", "revision_date": "2021-04-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-amp-imm-dll-tu79hvkO du 07 avril 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-tu79hvkO" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cucm-rce-pqVYwyb du 07 avril 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-pqVYwyb" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sb-rv-bypass-inject-Rbhgvfdx du 07 avril 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-vmanage-YuTVWqy du 07 avril 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-rv-multi-lldp-u7e4chCe du 07 avril 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-rv-rce-q3rxHnvm du 07 avril 2021", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-q3rxHnvm" } ] }
CERTFR-2020-AVI-472
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Cisco | IOS XE | Cisco IOS XE SD-WAN versions 17.2.x antérieures à 17.2.1r | ||
Cisco | SD-WAN vManage | Cisco SD-WAN vManage versions 19.x antérieures à 19.2.2 | ||
Cisco | SD-WAN vManage | Cisco SD-WAN vManage versions antérieures à 18.4.5 | ||
Cisco | SD-WAN vManage | Cisco SD-WAN vManage versions 19.3.x et 20.x antérieures à 20.1.1 | ||
Cisco | N/A | Cisco DCNM versions 11.x antérieures à 11.4(1) | ||
Cisco | IOS XE | Cisco IOS XE SD-WAN versions antérieures à 16.12.3 | ||
Cisco | N/A | Cisco SD-WAN vEdge, vBond et vSmart versions 19.3.x et 20.x antérieures à 20.1.1 | ||
Cisco | N/A | Cisco SD-WAN vEdge, vBond et vSmart versions 19.x antérieures à 19.2.2 | ||
Cisco | N/A | Cisco SD-WAN vEdge, vBond et vSmart versions antérieures à 18.4.5 |
Title | Publication Time | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Cisco IOS XE SD-WAN versions 17.2.x ant\u00e9rieures \u00e0 17.2.1r", "product": { "name": "IOS XE", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vManage versions 19.x ant\u00e9rieures \u00e0 19.2.2", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vManage versions ant\u00e9rieures \u00e0 18.4.5", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vManage versions 19.3.x et 20.x ant\u00e9rieures \u00e0 20.1.1", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco DCNM versions 11.x ant\u00e9rieures \u00e0 11.4(1)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco IOS XE SD-WAN versions ant\u00e9rieures \u00e0 16.12.3", "product": { "name": "IOS XE", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vEdge, vBond et vSmart versions 19.3.x et 20.x ant\u00e9rieures \u00e0 20.1.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vEdge, vBond et vSmart versions 19.x ant\u00e9rieures \u00e0 19.2.2", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco SD-WAN vEdge, vBond et vSmart versions ant\u00e9rieures \u00e0 18.4.5", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-3382", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3382" }, { "name": "CVE-2020-3376", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3376" }, { "name": "CVE-2020-3374", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3374" }, { "name": "CVE-2020-3375", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3375" }, { "name": "CVE-2020-3384", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3384" }, { "name": "CVE-2020-3383", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3383" }, { "name": "CVE-2020-3386", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3386" }, { "name": "CVE-2020-3377", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3377" } ], "initial_release_date": "2020-07-30T00:00:00", "last_revision_date": "2020-07-30T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-472", "revisions": [ { "description": "Version initiale", "revision_date": "2020-07-30T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-devmgr-cmd-inj-Umc8RHNh du 29 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-devmgr-cmd-inj-Umc8RHNh" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-dcnm-path-trav-2xZOnJdR du 29 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-path-trav-2xZOnJdR" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-dcnm-improper-auth-7Krd9TDT du 29 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-improper-auth-7Krd9TDT" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-uabvman-SYGzt8Bv du 29 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uabvman-SYGzt8Bv" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-dcnm-rest-inj-BCt8pwAJ du 29 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-rest-inj-BCt8pwAJ" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sdbufof-h5f5VSeL du 29 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdbufof-h5f5VSeL" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-dcnm-bypass-dyEejUMs du 29 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-bypass-dyEejUMs" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-dcnm-auth-bypass-JkubGpu3 du 29 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-auth-bypass-JkubGpu3" } ] }
CERTFR-2020-AVI-443
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans certains produits SD-WAN de Cisco. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Cisco | N/A | SD-WAN vEdge 20.1.x versions antérieures à 20.1.12 | ||
Cisco | N/A | SD-WAN vBond 18.4.x versions antérieures à 18.4.5 | ||
Cisco | SD-WAN vManage | SD-WAN vManage toutes versions antérieures à 19.2.3 | ||
Cisco | SD-WAN vManage | SD-WAN vManage 20.1.x versions antérieures à 20.1.1.1 | ||
Cisco | N/A | SD-WAN vEdge version 18.3 et toutes versions antérieures | ||
Cisco | N/A | SD-WAN vBond 18.3.x versions antérieures à 18.3.6 | ||
Cisco | N/A | SD-WAN vBond 20.1.x versions antérieures à 20.1.12 | ||
Cisco | N/A | SD-WAN vSmart 18.4.x versions antérieures à 18.4.5 | ||
Cisco | N/A | SD-WAN vSmart toutes versions antérieures à 18.3 | ||
Cisco | SD-WAN vManage | SD-WAN vManage 19.3 | ||
Cisco | N/A | SD-WAN vEdge 19.2.x versions antérieures à 19.2.3 | ||
Cisco | N/A | SD-WAN vEdge 18.4.x versions antérieures à 18.4.5 | ||
Cisco | N/A | SD-WAN vSmart 18.3.x versions antérieures à 18.3.6 | ||
Cisco | N/A | SD-WAN vBond 19.2.x versions antérieures à 19.2.3 | ||
Cisco | N/A | SD-WAN vSmart 20.1.x versions antérieures à 20.1.12 | ||
Cisco | N/A | SD-WAN vBond toutes versions antérieures à 18.3 | ||
Cisco | N/A | SD-WAN vSmart 19.2.x versions antérieures à 19.2.3 |
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SD-WAN vEdge 20.1.x versions ant\u00e9rieures \u00e0 20.1.12", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vBond 18.4.x versions ant\u00e9rieures \u00e0 18.4.5", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vManage toutes versions ant\u00e9rieures \u00e0 19.2.3", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vManage 20.1.x versions ant\u00e9rieures \u00e0 20.1.1.1", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vEdge version 18.3 et toutes versions ant\u00e9rieures", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vBond 18.3.x versions ant\u00e9rieures \u00e0 18.3.6", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vBond 20.1.x versions ant\u00e9rieures \u00e0 20.1.12", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vSmart 18.4.x versions ant\u00e9rieures \u00e0 18.4.5", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vSmart toutes versions ant\u00e9rieures \u00e0 18.3", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vManage 19.3", "product": { "name": "SD-WAN vManage", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vEdge 19.2.x versions ant\u00e9rieures \u00e0 19.2.3", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vEdge 18.4.x versions ant\u00e9rieures \u00e0 18.4.5", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vSmart 18.3.x versions ant\u00e9rieures \u00e0 18.3.6", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vBond 19.2.x versions ant\u00e9rieures \u00e0 19.2.3", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vSmart 20.1.x versions ant\u00e9rieures \u00e0 20.1.12", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vBond toutes versions ant\u00e9rieures \u00e0 18.3", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "SD-WAN vSmart 19.2.x versions ant\u00e9rieures \u00e0 19.2.3", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-3381", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3381" }, { "name": "CVE-2020-3388", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3388" }, { "name": "CVE-2020-3351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3351" }, { "name": "CVE-2020-3387", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3387" }, { "name": "CVE-2020-3385", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3385" }, { "name": "CVE-2020-3180", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3180" }, { "name": "CVE-2020-3369", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3369" } ], "initial_release_date": "2020-07-15T00:00:00", "last_revision_date": "2020-07-15T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-443", "revisions": [ { "description": "Version initiale", "revision_date": "2020-07-15T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans certains produits\nSD-WAN de Cisco. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Cisco SD-WAN", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fpdos-hORBfd9f du 15 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fpdos-hORBfd9f" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-vmanrce-4jtWT28P du 15 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanrce-4jtWT28P" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-clibypvman-sKcLf2L du 15 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clibypvman-sKcLf2L" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-vedgfpdos-PkqQrnwV du 15 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vedgfpdos-PkqQrnwV" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-vmdirtrav-eFdAxsJg du 15 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmdirtrav-eFdAxsJg" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sdw-dos-KWOdyHnB du 15 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-dos-KWOdyHnB" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sdscred-HfWWfqBj du 15 juillet 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdscred-HfWWfqBj" } ] }