Refine your search

6 vulnerabilities found for SD-WAN vManage by Cisco

CERTFR-2022-AVI-806
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Cisco SD-WAN vManage Cisco SD-WAN vManage versions antérieures à 20.6.4
Cisco N/A Adaptive Security Virtual Appliance (ASAv) versions 9.17.x antérieures à 9.17.1 (disponible à une date ultérieure)
Cisco N/A Secure Firewall Threat Defense Virtual (formerly FTDv) versions 7.2.x
Cisco N/A Secure Firewall Threat Defense Virtual (formerly FTDv) versions 7.1.x
Cisco SD-WAN vManage Cisco SD-WAN vManage versions 20.7.x à 20.9.x antérieures à 20.9.1
Cisco N/A Cisco Catalyst 8000V Edge versions 17.7.x antérieures à 17.7.2
Cisco N/A Cisco Catalyst 8000V Edge versions 17.8.x antérieures à 17.9.1
Cisco N/A Adaptive Security Virtual Appliance (ASAv) versions 9.18.x antérieures à 9.18.2
Cisco N/A Cisco Catalyst 8000V Edge versions 17.6.x antérieures à 17.6.4

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cisco SD-WAN vManage versions ant\u00e9rieures \u00e0 20.6.4",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Adaptive Security Virtual Appliance (ASAv) versions 9.17.x ant\u00e9rieures \u00e0 9.17.1 (disponible \u00e0 une date ult\u00e9rieure)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Secure Firewall Threat Defense Virtual (formerly FTDv) versions 7.2.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Secure Firewall Threat Defense Virtual (formerly FTDv) versions 7.1.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vManage versions 20.7.x \u00e0 20.9.x ant\u00e9rieures \u00e0 20.9.1",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Catalyst 8000V Edge versions 17.7.x ant\u00e9rieures \u00e0 17.7.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Catalyst 8000V Edge versions 17.8.x ant\u00e9rieures \u00e0 17.9.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Adaptive Security Virtual Appliance (ASAv) versions 9.18.x ant\u00e9rieures \u00e0 9.18.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Catalyst 8000V Edge versions 17.6.x ant\u00e9rieures \u00e0 17.6.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-28199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28199"
    },
    {
      "name": "CVE-2022-20696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20696"
    }
  ],
  "initial_release_date": "2022-09-08T00:00:00",
  "last_revision_date": "2022-09-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-806",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-09-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-mlx5-jbPCrqD8 du 07 septembre 2022",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlx5-jbPCrqD8"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-vmanage-msg-serv-AqTup7vs du 07 septembre 2022",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-msg-serv-AqTup7vs"
    }
  ]
}

CERTFR-2022-AVI-060
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Cisco ConfD ConfD versions 6.4.x antérieures à 6.4.7.2 et 6.4.8
Cisco Firepower Threat Defense Cisco Firepower Threat Defense (FTD) Software versions antérieures à 6.4.13
Cisco N/A Cybervision Software versions antérieures à 4.0.2
Cisco IOS XR Cisco IOS XR (64-bit) Software versions antérieures à 7.0.2, 7.1.1
Cisco N/A Cisco Virtual Topology System (VTS) versions antérieures à 2.6.5
Cisco N/A Cisco SD-WAN vEdge Routers versions antérieures à 18.4.4, 19.2.1, 19.3.0, 20.1.1
Cisco N/A Cisco Carrier Packet Transport toutes versions (aucun correctif ne sera publié car le produit est en fin de vie)
Cisco N/A Cisco Enterprise NFV Infrastructure Software (NFVIS) versions antérieures à 3.12.1
Cisco ConfD ConfD versions 6.7.x antérieures à 6.7.1
Cisco N/A Cisco SD-WAN vSmart Software versions antérieures à 18.4.4, 19.2.1, 19.3.0, 20.1.1
Cisco ConfD ConfD versions antérieures à 6.3.9.1
Cisco Firepower Threat Defense Cisco Firepower Threat Defense (FTD) Software versions 6.7.x et 7.0.x antérieures à 7.0.1
Cisco N/A Cisco Network Services Orchestrator (NSO) versions antérieures à 4.3.9.1, 4.4.5.6, 4.4.8, 4.5.7, 4.6.1.7, 4.6.2, 4.7.1, 5.1.0.1, 5.2
Cisco ConfD ConfD versions 6.6.x antérieures à 6.6.2
Cisco SD-WAN vManage Cisco SD-WAN vManage Software versions antérieures à 18.4.4, 19.2.1, 19.3.0, 20.1.1
Cisco N/A Cisco Ultra Gateway Platform versions antérieures à 6.15.0
Cisco IOS XE Cisco IOS XE SD-WAN versions antérieures à 16.10.2, 16.12.1b, 17.2.1r
Cisco Meraki MX Meraki MX Series Software toutes versions
Cisco N/A Cisco SD-WAN vBond Software versions antérieures à 18.4.4, 19.2.1, 19.3.0, 20.1.1
Cisco Firepower Threat Defense Cisco Firepower Threat Defense (FTD) Software versions 6.5.x et 6.6.x antérieures à 6.6.5.1
Cisco N/A Cisco RCM pour StarOS versions antérieures à 21.25.4
Cisco N/A Cisco Network Convergence System (NCS) 4009, 4016 versions antérieures à 6.5.32
Cisco ConfD ConfD versions 6.5.x antérieures à 6.5.7

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ConfD versions 6.4.x ant\u00e9rieures \u00e0 6.4.7.2 et 6.4.8",
      "product": {
        "name": "ConfD",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Firepower Threat Defense (FTD) Software versions ant\u00e9rieures \u00e0 6.4.13",
      "product": {
        "name": "Firepower Threat Defense",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cybervision Software versions ant\u00e9rieures \u00e0 4.0.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco IOS XR (64-bit) Software versions ant\u00e9rieures \u00e0 7.0.2, 7.1.1",
      "product": {
        "name": "IOS XR",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Virtual Topology System (VTS) versions ant\u00e9rieures \u00e0 2.6.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vEdge Routers versions ant\u00e9rieures \u00e0 18.4.4, 19.2.1, 19.3.0, 20.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Carrier Packet Transport toutes versions (aucun correctif ne sera publi\u00e9 car le produit est en fin de vie)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Enterprise NFV Infrastructure Software (NFVIS) versions ant\u00e9rieures \u00e0 3.12.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "ConfD versions 6.7.x ant\u00e9rieures \u00e0 6.7.1",
      "product": {
        "name": "ConfD",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vSmart Software versions ant\u00e9rieures \u00e0 18.4.4, 19.2.1, 19.3.0, 20.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "ConfD versions ant\u00e9rieures \u00e0 6.3.9.1",
      "product": {
        "name": "ConfD",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Firepower Threat Defense (FTD) Software versions 6.7.x et 7.0.x ant\u00e9rieures \u00e0 7.0.1",
      "product": {
        "name": "Firepower Threat Defense",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Network Services Orchestrator (NSO) versions ant\u00e9rieures \u00e0 4.3.9.1, 4.4.5.6, 4.4.8, 4.5.7, 4.6.1.7, 4.6.2, 4.7.1, 5.1.0.1, 5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "ConfD versions 6.6.x ant\u00e9rieures \u00e0 6.6.2",
      "product": {
        "name": "ConfD",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vManage Software versions ant\u00e9rieures \u00e0 18.4.4, 19.2.1, 19.3.0, 20.1.1",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Ultra Gateway Platform versions ant\u00e9rieures \u00e0 6.15.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco IOS XE SD-WAN versions ant\u00e9rieures \u00e0 16.10.2, 16.12.1b, 17.2.1r",
      "product": {
        "name": "IOS XE",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Meraki MX Series Software toutes versions",
      "product": {
        "name": "Meraki MX",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vBond Software versions ant\u00e9rieures \u00e0 18.4.4, 19.2.1, 19.3.0, 20.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Firepower Threat Defense (FTD) Software versions 6.5.x et 6.6.x ant\u00e9rieures \u00e0 6.6.5.1",
      "product": {
        "name": "Firepower Threat Defense",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco RCM pour StarOS versions ant\u00e9rieures \u00e0 21.25.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Network Convergence System (NCS) 4009, 4016 versions ant\u00e9rieures \u00e0 6.5.32",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "ConfD versions 6.5.x ant\u00e9rieures \u00e0 6.5.7",
      "product": {
        "name": "ConfD",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-20649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20649"
    },
    {
      "name": "CVE-2022-20655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20655"
    },
    {
      "name": "CVE-2022-20648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20648"
    },
    {
      "name": "CVE-2022-20685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20685"
    }
  ],
  "initial_release_date": "2022-01-20T00:00:00",
  "last_revision_date": "2022-01-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-060",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-01-20T00:00:00.000000"
    },
    {
      "description": "Ajout de la CVE-2022-20648",
      "revision_date": "2022-01-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cli-cmdinj-4MttWZPB du 19 janvier 2022",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-snort-dos-9D3hJLuj du 19 janvier 2022",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-confdcli-cmdinj-wybQDSSh du 19 janvier 2022",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-rcm-vuls-7cS3Nuq du 19 janvier 2022",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-vuls-7cS3Nuq"
    }
  ]
}

CERTFR-2021-AVI-350
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Cisco N/A Cisco SD-WAN vEdge Cloud Routers versions antérieures à 20.4.1 ou 20.5.1
Cisco N/A Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE versions antérieures à 1.0.4.3
Cisco N/A Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE versions antérieures à 1.1.3.2
Cisco N/A Cisco WAP351 Wireless-N Dual Radio Access Point with 5-Port Switch1 toutes versions (produit en fin de vie, ne recevra pas de correctif)
Cisco N/A Cisco WAP131 Wireless-N Dual Radio Access Point with PoE 1 toutes versions (produit en fin de vie, ne recevra pas de correctif)
Cisco N/A Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point with 2.5GbE LAN versions antérieures à 1.0.4.4
Cisco N/A Cisco AnyConnect Secure Mobility Client pour Windows versions antérieures à 4.10.00093
Cisco N/A Cisco Enterprise NFV Infrastructure Software (NFVIS) versions antérieures à 4.5.1
Cisco N/A Cisco HyperFlex HX Software versions antérieures à 4.0(2e) ou 4.5(1b) 4.5(2a)
Cisco Unified Communications Manager Cisco Unified Communications Manager IM & Presence Service versions antérieures à 11.5(1)SU9
Cisco N/A Cisco SD-WAN vSmart Controller Software versions antérieures à 20.4.1 ou 20.5.1
Cisco N/A Cisco SD-WAN vEdge Routers versions antérieures à 20.4.1 ou 20.5.1
Cisco SD-WAN vManage Cisco SD-WAN vManage Software versions antérieures à 20.4.1 ou 20.5.1
Cisco IOS XE IOS XE SD-WAN Software toutes versions
Cisco Unified Communications Manager Cisco Unified Communications Manager IM & Presence Service versions 12.x antérieures à 12.5(1)SU4
Cisco N/A Cisco SD-WAN vBond Orchestrator Software versions antérieures à 20.4.1 ou 20.5.1
Cisco N/A Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE versions antérieures à 1.1.3.2

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cisco SD-WAN vEdge Cloud Routers versions ant\u00e9rieures \u00e0 20.4.1 ou 20.5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE versions ant\u00e9rieures \u00e0 1.0.4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE versions ant\u00e9rieures \u00e0 1.1.3.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco WAP351 Wireless-N Dual Radio Access Point with 5-Port Switch1 toutes versions (produit en fin de vie, ne recevra pas de correctif)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco WAP131 Wireless-N Dual Radio Access Point with PoE 1 toutes versions (produit en fin de vie, ne recevra pas de correctif)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point with 2.5GbE LAN versions ant\u00e9rieures \u00e0 1.0.4.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco AnyConnect Secure Mobility Client pour Windows versions ant\u00e9rieures \u00e0 4.10.00093",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Enterprise NFV Infrastructure Software (NFVIS) versions ant\u00e9rieures \u00e0 4.5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco HyperFlex HX Software versions ant\u00e9rieures \u00e0 4.0(2e) ou 4.5(1b) 4.5(2a)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Unified Communications Manager IM \u0026 Presence Service versions ant\u00e9rieures \u00e0 11.5(1)SU9",
      "product": {
        "name": "Unified Communications Manager",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vSmart Controller Software versions ant\u00e9rieures \u00e0 20.4.1 ou 20.5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vEdge Routers versions ant\u00e9rieures \u00e0 20.4.1 ou 20.5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vManage Software versions ant\u00e9rieures \u00e0 20.4.1 ou 20.5.1",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "IOS XE SD-WAN Software toutes versions",
      "product": {
        "name": "IOS XE",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Unified Communications Manager IM \u0026 Presence Service versions 12.x ant\u00e9rieures \u00e0 12.5(1)SU4",
      "product": {
        "name": "Unified Communications Manager",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vBond Orchestrator Software versions ant\u00e9rieures \u00e0 20.4.1 ou 20.5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE versions ant\u00e9rieures \u00e0 1.1.3.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-1430",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1430"
    },
    {
      "name": "CVE-2021-1428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1428"
    },
    {
      "name": "CVE-2021-1275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1275"
    },
    {
      "name": "CVE-2021-1468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1468"
    },
    {
      "name": "CVE-2021-1365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1365"
    },
    {
      "name": "CVE-2021-1497",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1497"
    },
    {
      "name": "CVE-2021-1426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1426"
    },
    {
      "name": "CVE-2021-1510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1510"
    },
    {
      "name": "CVE-2021-1508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1508"
    },
    {
      "name": "CVE-2021-1513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1513"
    },
    {
      "name": "CVE-2021-1401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1401"
    },
    {
      "name": "CVE-2021-1429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1429"
    },
    {
      "name": "CVE-2021-1505",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1505"
    },
    {
      "name": "CVE-2021-1363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1363"
    },
    {
      "name": "CVE-2021-1509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1509"
    },
    {
      "name": "CVE-2021-1498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1498"
    },
    {
      "name": "CVE-2021-1427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1427"
    },
    {
      "name": "CVE-2021-1421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1421"
    },
    {
      "name": "CVE-2021-1284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1284"
    },
    {
      "name": "CVE-2021-1511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1511"
    },
    {
      "name": "CVE-2021-1506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1506"
    },
    {
      "name": "CVE-2021-1400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1400"
    },
    {
      "name": "CVE-2021-1496",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1496"
    }
  ],
  "initial_release_date": "2021-05-06T00:00:00",
  "last_revision_date": "2021-06-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-350",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-05-06T00:00:00.000000"
    },
    {
      "description": "Correction de la version 4.5 non vuln\u00e9rable d\u0027HyperFlex HX.",
      "revision_date": "2021-06-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-anyconnect-code-exec-jR3tWTA6 du 05 mai 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-code-exec-jR3tWTA6"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sdw-auth-bypass-65aYqcS2 du 05 mai 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-auth-bypass-65aYqcS2"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sb-wap-multi-ZAfKGXhF du 05 mai 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sd-wan-vmanage-4TbynnhZ du 05 mai 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sdwan-dos-Ckn5cVqW du 05 mai 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dos-Ckn5cVqW"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-imp-inj-ereCOKjR du 05 mai 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-inj-ereCOKjR"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sdwan-buffover-MWGucjtO du 05 mai 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-hyperflex-rce-TjjNrkpR du 05 mai 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-rce-TjjNrkpR"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-nfvis-cmdinj-DkFjqg2j du 05 mai 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-cmdinj-DkFjqg2j"
    }
  ]
}

CERTFR-2021-AVI-246
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Cisco ClamAV ClamAV pour Windows versions antérieures à 0.103.2
Cisco Small Business les routeurs Cisco Small Business RV110W, RV130, RV130W et RV215W (ces produits sont en fin de vie donc aucun correctif ne sera publié pour la vulnérabilité critique CVE-2021-1459)
Cisco N/A Cisco Unified CM IM&P versions antérieures à 11.5(1)SU9
Cisco Small Business les routeurs Cisco Small Business RV134W versions antérieures à 1.0.1.21
Cisco SD-WAN vManage Cisco SD-WAN vManage versions 19.x et 20.x antérieures à 20.3.3
Cisco SD-WAN vManage Cisco SD-WAN vManage versions 20.4.x antérieures à 20.4.1
Cisco N/A Immunet versions antérieures à 7.4.0
Cisco N/A Cisco AMP for Endpoints pour Windows versions antérieures à 7.3.15
Cisco Unity Connection Cisco Unity Connection versions antérieures à 11.5(1)SU9
Cisco Small Business les routeurs Cisco Small Business RV132W versions antérieures à 1.0.1.15
Cisco Unity Connection Cisco Unity Connection versions 12.0.x et 12.5.x antérieures à 12.5(1)SU4
Cisco Small Business les routeurs Cisco Small Business RV160, RV160W, RV260, RV260P et RV260W versions antérieures à 1.0.01.03
Cisco N/A Cisco Unified CM IM&P versions 12.0.x et 12.5.x antérieures à 12.5(1)SU4
Cisco N/A Cisco Unified CM et Unified CM SME versions 12.0.x et 12.5.x antérieures à 12.5(1)SU4
Cisco SD-WAN vManage Cisco SD-WAN vManage versions antérieures à 19.2.4
Cisco N/A Cisco Unified CM et Unified CM SME versions antérieures à 11.5(1)SU9
Cisco Small Business les routeurs Cisco Small Business RV340, RV340W, RV345 et RV345P versions antérieures à 1.0.03.21
Cisco N/A Cisco Prime License Manager versions antérieures à 11.5(1)SU9

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ClamAV pour Windows versions ant\u00e9rieures \u00e0 0.103.2",
      "product": {
        "name": "ClamAV",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "les routeurs Cisco Small Business RV110W, RV130, RV130W et RV215W (ces produits sont en fin de vie donc aucun correctif ne sera publi\u00e9 pour la vuln\u00e9rabilit\u00e9 critique CVE-2021-1459)",
      "product": {
        "name": "Small Business",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Unified CM IM\u0026P versions ant\u00e9rieures \u00e0 11.5(1)SU9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "les routeurs Cisco Small Business RV134W versions ant\u00e9rieures \u00e0 1.0.1.21",
      "product": {
        "name": "Small Business",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vManage versions 19.x et 20.x ant\u00e9rieures \u00e0 20.3.3",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vManage versions 20.4.x ant\u00e9rieures \u00e0 20.4.1",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Immunet versions ant\u00e9rieures \u00e0 7.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco AMP for Endpoints pour Windows versions ant\u00e9rieures \u00e0 7.3.15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Unity Connection versions ant\u00e9rieures \u00e0 11.5(1)SU9",
      "product": {
        "name": "Unity Connection",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "les routeurs Cisco Small Business RV132W versions ant\u00e9rieures \u00e0 1.0.1.15",
      "product": {
        "name": "Small Business",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Unity Connection versions 12.0.x et 12.5.x ant\u00e9rieures \u00e0 12.5(1)SU4",
      "product": {
        "name": "Unity Connection",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "les routeurs Cisco Small Business RV160, RV160W, RV260, RV260P et RV260W versions ant\u00e9rieures \u00e0 1.0.01.03",
      "product": {
        "name": "Small Business",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Unified CM IM\u0026P versions 12.0.x et 12.5.x ant\u00e9rieures \u00e0 12.5(1)SU4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Unified CM et Unified CM SME versions 12.0.x et 12.5.x ant\u00e9rieures \u00e0 12.5(1)SU4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vManage versions ant\u00e9rieures \u00e0 19.2.4",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Unified CM et Unified CM SME versions ant\u00e9rieures \u00e0 11.5(1)SU9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "les routeurs Cisco Small Business RV340, RV340W, RV345 et RV345P versions ant\u00e9rieures \u00e0 1.0.03.21",
      "product": {
        "name": "Small Business",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Prime License Manager versions ant\u00e9rieures \u00e0 11.5(1)SU9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1473"
    },
    {
      "name": "CVE-2021-1480",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1480"
    },
    {
      "name": "CVE-2021-1479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1479"
    },
    {
      "name": "CVE-2021-1362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1362"
    },
    {
      "name": "CVE-2021-1309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1309"
    },
    {
      "name": "CVE-2021-1386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1386"
    },
    {
      "name": "CVE-2021-1472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1472"
    },
    {
      "name": "CVE-2021-1251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1251"
    },
    {
      "name": "CVE-2021-1459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1459"
    },
    {
      "name": "CVE-2021-1137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1137"
    },
    {
      "name": "CVE-2021-1308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1308"
    }
  ],
  "initial_release_date": "2021-04-08T00:00:00",
  "last_revision_date": "2021-04-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-246",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-04-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-amp-imm-dll-tu79hvkO du 07 avril 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-tu79hvkO"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cucm-rce-pqVYwyb du 07 avril 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-pqVYwyb"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sb-rv-bypass-inject-Rbhgvfdx du 07 avril 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-vmanage-YuTVWqy du 07 avril 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-rv-multi-lldp-u7e4chCe du 07 avril 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-rv-rce-q3rxHnvm du 07 avril 2021",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-q3rxHnvm"
    }
  ]
}

CERTFR-2020-AVI-472
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Cisco. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Cisco IOS XE Cisco IOS XE SD-WAN versions 17.2.x antérieures à 17.2.1r
Cisco SD-WAN vManage Cisco SD-WAN vManage versions 19.x antérieures à 19.2.2
Cisco SD-WAN vManage Cisco SD-WAN vManage versions antérieures à 18.4.5
Cisco SD-WAN vManage Cisco SD-WAN vManage versions 19.3.x et 20.x antérieures à 20.1.1
Cisco N/A Cisco DCNM versions 11.x antérieures à 11.4(1)
Cisco IOS XE Cisco IOS XE SD-WAN versions antérieures à 16.12.3
Cisco N/A Cisco SD-WAN vEdge, vBond et vSmart versions 19.3.x et 20.x antérieures à 20.1.1
Cisco N/A Cisco SD-WAN vEdge, vBond et vSmart versions 19.x antérieures à 19.2.2
Cisco N/A Cisco SD-WAN vEdge, vBond et vSmart versions antérieures à 18.4.5

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cisco IOS XE SD-WAN versions 17.2.x ant\u00e9rieures \u00e0 17.2.1r",
      "product": {
        "name": "IOS XE",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vManage versions 19.x ant\u00e9rieures \u00e0 19.2.2",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vManage versions ant\u00e9rieures \u00e0 18.4.5",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vManage versions 19.3.x et 20.x ant\u00e9rieures \u00e0 20.1.1",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco DCNM versions 11.x ant\u00e9rieures \u00e0 11.4(1)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco IOS XE SD-WAN versions ant\u00e9rieures \u00e0 16.12.3",
      "product": {
        "name": "IOS XE",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vEdge, vBond et vSmart versions 19.3.x et 20.x ant\u00e9rieures \u00e0 20.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vEdge, vBond et vSmart versions 19.x ant\u00e9rieures \u00e0 19.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco SD-WAN vEdge, vBond et vSmart versions ant\u00e9rieures \u00e0 18.4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-3382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3382"
    },
    {
      "name": "CVE-2020-3376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3376"
    },
    {
      "name": "CVE-2020-3374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3374"
    },
    {
      "name": "CVE-2020-3375",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3375"
    },
    {
      "name": "CVE-2020-3384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3384"
    },
    {
      "name": "CVE-2020-3383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3383"
    },
    {
      "name": "CVE-2020-3386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3386"
    },
    {
      "name": "CVE-2020-3377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3377"
    }
  ],
  "initial_release_date": "2020-07-30T00:00:00",
  "last_revision_date": "2020-07-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-472",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-07-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-devmgr-cmd-inj-Umc8RHNh du 29 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-devmgr-cmd-inj-Umc8RHNh"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-dcnm-path-trav-2xZOnJdR du 29 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-path-trav-2xZOnJdR"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-dcnm-improper-auth-7Krd9TDT du 29 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-improper-auth-7Krd9TDT"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-uabvman-SYGzt8Bv du 29 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uabvman-SYGzt8Bv"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-dcnm-rest-inj-BCt8pwAJ du 29 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-rest-inj-BCt8pwAJ"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sdbufof-h5f5VSeL du 29 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdbufof-h5f5VSeL"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-dcnm-bypass-dyEejUMs du 29 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-bypass-dyEejUMs"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-dcnm-auth-bypass-JkubGpu3 du 29 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-auth-bypass-JkubGpu3"
    }
  ]
}

CERTFR-2020-AVI-443
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans certains produits SD-WAN de Cisco. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Cisco N/A SD-WAN vEdge 20.1.x versions antérieures à 20.1.12
Cisco N/A SD-WAN vBond 18.4.x versions antérieures à 18.4.5
Cisco SD-WAN vManage SD-WAN vManage toutes versions antérieures à 19.2.3
Cisco SD-WAN vManage SD-WAN vManage 20.1.x versions antérieures à 20.1.1.1
Cisco N/A SD-WAN vEdge version 18.3 et toutes versions antérieures
Cisco N/A SD-WAN vBond 18.3.x versions antérieures à 18.3.6
Cisco N/A SD-WAN vBond 20.1.x versions antérieures à 20.1.12
Cisco N/A SD-WAN vSmart 18.4.x versions antérieures à 18.4.5
Cisco N/A SD-WAN vSmart toutes versions antérieures à 18.3
Cisco SD-WAN vManage SD-WAN vManage 19.3
Cisco N/A SD-WAN vEdge 19.2.x versions antérieures à 19.2.3
Cisco N/A SD-WAN vEdge 18.4.x versions antérieures à 18.4.5
Cisco N/A SD-WAN vSmart 18.3.x versions antérieures à 18.3.6
Cisco N/A SD-WAN vBond 19.2.x versions antérieures à 19.2.3
Cisco N/A SD-WAN vSmart 20.1.x versions antérieures à 20.1.12
Cisco N/A SD-WAN vBond toutes versions antérieures à 18.3
Cisco N/A SD-WAN vSmart 19.2.x versions antérieures à 19.2.3

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SD-WAN vEdge 20.1.x versions ant\u00e9rieures \u00e0 20.1.12",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vBond 18.4.x versions ant\u00e9rieures \u00e0 18.4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vManage toutes versions ant\u00e9rieures \u00e0 19.2.3",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vManage 20.1.x versions ant\u00e9rieures \u00e0 20.1.1.1",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vEdge version 18.3 et toutes versions ant\u00e9rieures",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vBond 18.3.x versions ant\u00e9rieures \u00e0 18.3.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vBond 20.1.x versions ant\u00e9rieures \u00e0 20.1.12",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vSmart 18.4.x versions ant\u00e9rieures \u00e0 18.4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vSmart toutes versions ant\u00e9rieures \u00e0 18.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vManage 19.3",
      "product": {
        "name": "SD-WAN vManage",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vEdge 19.2.x versions ant\u00e9rieures \u00e0 19.2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vEdge 18.4.x versions ant\u00e9rieures \u00e0 18.4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vSmart 18.3.x versions ant\u00e9rieures \u00e0 18.3.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vBond 19.2.x versions ant\u00e9rieures \u00e0 19.2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vSmart 20.1.x versions ant\u00e9rieures \u00e0 20.1.12",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vBond toutes versions ant\u00e9rieures \u00e0 18.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "SD-WAN vSmart 19.2.x versions ant\u00e9rieures \u00e0 19.2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-3381",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3381"
    },
    {
      "name": "CVE-2020-3388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3388"
    },
    {
      "name": "CVE-2020-3351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3351"
    },
    {
      "name": "CVE-2020-3387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3387"
    },
    {
      "name": "CVE-2020-3385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3385"
    },
    {
      "name": "CVE-2020-3180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3180"
    },
    {
      "name": "CVE-2020-3369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3369"
    }
  ],
  "initial_release_date": "2020-07-15T00:00:00",
  "last_revision_date": "2020-07-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-443",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-07-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans certains produits\nSD-WAN de Cisco. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Cisco SD-WAN",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fpdos-hORBfd9f du 15 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fpdos-hORBfd9f"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-vmanrce-4jtWT28P du 15 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanrce-4jtWT28P"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-clibypvman-sKcLf2L du 15 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clibypvman-sKcLf2L"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-vedgfpdos-PkqQrnwV du 15 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vedgfpdos-PkqQrnwV"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-vmdirtrav-eFdAxsJg du 15 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmdirtrav-eFdAxsJg"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sdw-dos-KWOdyHnB du 15 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-dos-KWOdyHnB"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sdscred-HfWWfqBj du 15 juillet 2020",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdscred-HfWWfqBj"
    }
  ]
}