{"id":4156,"date":"2024-07-19T09:57:42","date_gmt":"2024-07-19T06:57:42","guid":{"rendered":"https:\/\/www.govcert.bg\/?p=4156"},"modified":"2024-07-19T10:28:24","modified_gmt":"2024-07-19T07:28:24","slug":"cisco-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d0%b0%d0%ba%d1%82%d1%83%d0%b0%d0%bb%d0%b8%d0%b7%d0%b0%d1%86%d0%b8%d0%b8-%d0%b7%d0%b0-%d1%81%d0%b8%d0%b3%d1%83%d1%80%d0%bd%d0%be%d1%81-11","status":"publish","type":"post","link":"https:\/\/www.govcert.bg\/en\/warnings\/cisco-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d0%b0%d0%ba%d1%82%d1%83%d0%b0%d0%bb%d0%b8%d0%b7%d0%b0%d1%86%d0%b8%d0%b8-%d0%b7%d0%b0-%d1%81%d0%b8%d0%b3%d1%83%d1%80%d0%bd%d0%be%d1%81-11\/","title":{"rendered":"Cisco Releases Security Updates for Multiple Products"},"content":{"rendered":"<p style=\"text-align: justify;\"><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/07\/18\/cisco-releases-security-updates-multiple-products\">Cisco<\/a> released security updates to address vulnerabilities in Cisco software. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.<\/p>\n<p style=\"text-align: justify;\"><strong>CERT Bulgaria<\/strong> encourages users and administrators to review the following advisories and apply the necessary updates:<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-esa-afw-bGG2UsjH\">Cisco Secure Email Gateway Arbitrary File Write Vulnerability<\/a><\/li>\n<li><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-cssm-auth-sLw3uhUy\">Cisco Smart Software Manager On-Prem Password Change Vulnerability<\/a><\/li>\n<li><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-swa-priv-esc-7uHpZsCC\">Cisco Secure Web Appliance Privilege Escalation Vulnerability<\/a><\/li>\n<li><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-ise-file-upload-krW2TxA9\">Cisco Identity Services Engine Arbitrary File Upload Vulnerability<\/a><\/li>\n<li><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-inode-static-key-VUVCeynn\">Cisco Intelligent Node Software Static Key Vulnerability<\/a><\/li>\n<li><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-webex-app-ZjNm8X8j\">Cisco Webex App Vulnerabilities<\/a><\/li>\n<li><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sb-rv34x-rce-7pqFU2e\">Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers Authenticated Remote Code Execution Vulnerability<\/a><\/li>\n<li><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-expressway-redirect-KJsFuXgj\">Cisco Expressway Series Open Redirect Vulnerability<\/a><\/li>\n<li><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ\">Cisco Secure Email Gateway Server-Side Template Injection Vulnerability<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Cisco released security updates to address vulnerabilities in Cisco software. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. <a title=\"Cisco Releases Security Updates for Multiple Products\" class=\"read-more\" href=\"https:\/\/www.govcert.bg\/en\/warnings\/cisco-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d0%b0%d0%ba%d1%82%d1%83%d0%b0%d0%bb%d0%b8%d0%b7%d0%b0%d1%86%d0%b8%d0%b8-%d0%b7%d0%b0-%d1%81%d0%b8%d0%b3%d1%83%d1%80%d0%bd%d0%be%d1%81-11\/\" aria-label=\"More on Cisco \u043f\u0443\u0431\u043b\u0438\u043a\u0443\u0432\u0430 \u0430\u043a\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0437\u0430 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442 \u0437\u0430 \u043c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438\">Read more<\/a><\/p>","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[],"class_list":["post-4156","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/4156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/comments?post=4156"}],"version-history":[{"count":2,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/4156\/revisions"}],"predecessor-version":[{"id":4160,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/4156\/revisions\/4160"}],"wp:attachment":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/media?parent=4156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/categories?post=4156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/tags?post=4156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}