Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
CISCO Product Updates (AL01/230112/CSIRT-ITA)

CISCO Product Updates (AL01/230112/CSIRT-ITA)

Summary

Cisco security updates address multiple vulnerabilities, including 4 “high” severity and 2 “critical” severity vulnerabilities in multiple products.

Note: The vendor states that a Proof of Concept (PoC) for exploitation of CVE-2023-20025 and CVE-2023-20026 is available online.

Note: CVE-2023-20118 is actively being exploited online.

Note: The vendor states that CVE-2023-20025 and CVE-2023-20026 are actively being exploited online.

Risk

Vulnerability Impact Estimated on the Target Community: Critical (78.2)

Type

  • Remote Code Execution
  • Authentication Bypass
  • Information Disclosure
  • Denial of Service

Affected Products and Versions

Cisco

  • Router Small Business RV016, RV042, RV042G e RV082 Routers
  • Web Management Interface di IP Phone serie 7800 e 8800
  • Industrial Network Director
  • BroadWorks Application Delivery Platform e Xtended Services Platform
  • Router RV340, RV340W, RV345 e RV345P
  • Router Small Business RV160 e RV260
  • TelePresence Collaboration Endpoint e RoomOS Software
  • Network Services Orchestrator
  • Webex Room Phone e Cisco Webex Share
  • CX Cloud Agent
  • Unified Intelligence Center
  • BroadWorks Application Delivery Platform

Mitigation actions

In line with the vendor’s statements, it is recommended to apply the available mitigations following the indications reported in the security bulletins reported in the References section.

As indicated by the vendor, only the indicators detected by external researchers with severity “high” and “critical” are reported.

CVE
CVE-2023-20018CVE-2023-20038
CVE-2023-20020CVE-2023-20118
CVE-2023-20025
CVE-2023-20026
CVE-2023-20037

References

https://sec.cloudapps.cisco.com/security/center/publicationListing.x

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-xss-EzqDXqG4

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-xss-Omm8jyBX

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cxagent-gOq9QjqZ

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lldp-memlk-McOecPT

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-path-trvsl-zjBeMkZg

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-dkjGFgRK

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-cmd-exe-n47kJQLE

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rcedos-7HjP74jD

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-dos-HpkeYzp

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-fZyVjJtG

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services