{"id":3570,"date":"2023-09-29T09:56:28","date_gmt":"2023-09-29T06:56:28","guid":{"rendered":"https:\/\/www.govcert.bg\/?p=3570"},"modified":"2023-09-29T12:38:03","modified_gmt":"2023-09-29T09:38:03","slug":"cisco-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d1%81%d1%8a%d0%b2%d0%b5%d1%82%d0%b8-%d0%b7%d0%b0-%d1%81%d0%b8%d0%b3%d1%83%d1%80%d0%bd%d0%be%d1%81%d1%82","status":"publish","type":"post","link":"https:\/\/www.govcert.bg\/en\/warnings\/cisco-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d1%81%d1%8a%d0%b2%d0%b5%d1%82%d0%b8-%d0%b7%d0%b0-%d1%81%d0%b8%d0%b3%d1%83%d1%80%d0%bd%d0%be%d1%81%d1%82\/","title":{"rendered":"Cisco Releases Security Advisories for Multiple Products"},"content":{"rendered":"<p style=\"text-align: justify;\"><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/09\/28\/cisco-releases-security-advisories-multiple-products\">Cisco<\/a> has released security advisories for vulnerabilities affecting multiple Cisco products. A remote cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.<\/p>\n<p style=\"text-align: justify;\"><strong>CERT <\/strong><strong>Bulgaria<\/strong> encourages users and administrators to review the following advisories and apply the necessary updates:<\/p>\n<ul>\n<li style=\"text-align: justify;\">Cisco Catalyst SD-WAN Manager Vulnerabilities <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sdwan-vman-sc-LRLfu2z\">cisco-sa-sdwan-vman-sc-LRLfu2z<\/a><\/li>\n<li style=\"text-align: justify;\">Cisco IOS XE Software Web UI Command Injection Vulnerability <a href=\"\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-mlre-H93FswRz\">cisco-sa-webui-cmdij-FzZAeXAy<\/a><\/li>\n<li style=\"text-align: justify;\">Cisco IOS XE Software for ASR 1000 Series Aggregation Services Routers IPv6 Multicast Denial of Service Vulnerability <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-mlre-H93FswRz\">cisco-sa-mlre-H93FswRz<\/a><\/li>\n<li style=\"text-align: justify;\">Cisco IOS XE Software Layer 2 Tunneling Protocol Denial of Service Vulnerability <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-ios-xe-l2tp-dos-eB5tuFmV\">cisco-sa-ios-xe-l2tp-dos-eB5tuFmV<\/a><\/li>\n<li style=\"text-align: justify;\">Cisco DNA Center API Insufficient Access Control Vulnerability <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-dnac-ins-acc-con-nHAVDRBZ\">cisco-sa-dnac-ins-acc-con-nHAVDRBZ<\/a><\/li>\n<li style=\"text-align: justify;\">Cisco IOS XE Software for Catalyst 3650 and Catalyst 3850 Series Switches Denial of Service Vulnerability <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-cat3k-dos-ZZA4Gb3r\">cisco-sa-cat3k-dos-ZZA4Gb3r<\/a><\/li>\n<li style=\"text-align: justify;\">Cisco IOS XE Software Application Quality of Experience and Unified Threat Defense Denial of Service Vulnerability <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-appqoe-utd-dos-p8O57p5y\">cisco-sa-appqoe-utd-dos-p8O57p5y<\/a><\/li>\n<li style=\"text-align: justify;\">Cisco IOS and IOS XE Software Command Authorization Bypass Vulnerability <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-aaascp-Tyj4fEJm\">cisco-sa-aaascp-Tyj4fEJm<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Cisco \u043f\u0443\u0431\u043b\u0438\u043a\u0443\u0432\u0430 \u0441\u044a\u0432\u0435\u0442\u0438 \u0437\u0430 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442 \u0437\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430 \u043c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438 \u043d\u0430 Cisco. \u041d\u0430\u043f\u0430\u0434\u0430\u0442\u0435\u043b \u043c\u043e\u0436\u0435 \u0434\u0430 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430 \u043d\u044f\u043a\u043e\u0438 \u043e\u0442 \u0442\u0435\u0437\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0437\u0430 \u0434\u0430 \u043f\u043e\u0435\u043c\u0435 \u043a\u043e\u043d\u0442\u0440\u043e\u043b \u043d\u0430\u0434 \u0437\u0430\u0441\u0435\u0433\u043d\u0430\u0442\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430. CERT \u0411\u044a\u043b\u0433\u0430\u0440\u0438\u044f \u043f\u0440\u0435\u043f\u043e\u0440\u044a\u0447\u0432\u0430 \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u0438\u0442\u0435 \u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0438\u0442\u0435 \u0434\u0430 \u0441\u0435 \u0437\u0430\u043f\u043e\u0437\u043d\u0430\u044f\u0442 \u0441\u044a\u0441 \u0441\u043b\u0435\u0434\u043d\u0438\u0442\u0435 \u0441\u044a\u0432\u0435\u0442\u0438 \u0438 \u0434\u0430 \u043f\u0440\u0438\u043b\u043e\u0436\u0430\u0442 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u0438\u0442\u0435 \u0430\u043a\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438: Cisco Catalyst SD-WAN Manager Vulnerabilities cisco-sa-sdwan-vman-sc-LRLfu2z Cisco IOS XE Software Web &#8230; <a title=\"Cisco Releases Security Advisories for Multiple Products\" class=\"read-more\" href=\"https:\/\/www.govcert.bg\/en\/warnings\/cisco-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d1%81%d1%8a%d0%b2%d0%b5%d1%82%d0%b8-%d0%b7%d0%b0-%d1%81%d0%b8%d0%b3%d1%83%d1%80%d0%bd%d0%be%d1%81%d1%82\/\" aria-label=\"More on Cisco \u043f\u0443\u0431\u043b\u0438\u043a\u0443\u0432\u0430 \u0441\u044a\u0432\u0435\u0442\u0438 \u0437\u0430 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442\">Read more<\/a><\/p>","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[],"class_list":["post-3570","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/3570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/comments?post=3570"}],"version-history":[{"count":5,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/3570\/revisions"}],"predecessor-version":[{"id":3577,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/3570\/revisions\/3577"}],"wp:attachment":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/media?parent=3570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/categories?post=3570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/tags?post=3570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}