in

Cisco security warning: Patch Webex Teams for Windows and surveillance camera now

Cisco has released security updates for high-severity security flaws affecting Webex Teams for Windows, its Identity Services Engine, and Video Surveillance 8000 Series IP Cameras. 

In this month’s first round of security updates from Cisco, the most serious vulnerability addressed is a remote code-execution (RCE) and denial-of-service (DoS) bug affecting its Video Surveillance 8000 Series IP Cameras.

Networking

The flaw, tracked as CVE-2020-3544, has a severity rating of 8.8 out of 10, on par with similar RCE and DoS flaws it disclosed in August affecting the Video Surveillance 8000 Series IP Cameras. 

SEE: Security Awareness and Training policy (TechRepublic Premium)

Both sets of vulnerabilities were reported by Qian Chen of Qihoo 360 Nirvan Team and both concern flaws in the Cisco Discovery Protocol, a Layer 2 or data link layer protocol in the Open Systems Interconnection (OSI) networking model. 

Similarly, both are due to “missing checks when an IP camera processes a Cisco Discovery Protocol packet”.

“An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to execute code on the affected IP camera or cause it to reload unexpectedly, resulting in a DoS condition,” Cisco notes in the new advisory. 

Any Cisco customers with the product that updated to firmware releases 1.0.9-4 and later after the August advisory should be safe, but customers that didn’t update to that release or later will still be vulnerable. There are no workarounds. 

The second most severe flaw affects the web management interface of Cisco Identity Services Engine (ISE) and occurs because the interface doesn’t properly enforce role-based access control. 

The bug, tagged as CVE-2020-3467, has a severity rating of 7.7 out of 10. A remote attacker needs to be authenticated with read-only admin credentials to exploit the flaw.

However, if that condition is met, the attacker could modify a vulnerable device’s configuration after sending a crafted HTTP request to it and then bring unauthorized devices onto the network or block permitted devices from accessing the network.   

The issue affects ISE releases 2.3, 2.4. 2.5, 2.6, and 2,7. Versions 2.2 and earlier and version 3.0 are not vulnerable. Cisco has patch recommendations for each release in its advisory. 

The bug was reported to Cisco by Sebastian Halter of Deutsche Telekom.   

The third high-severity flaw affects Cisco’s Webex Teams client for Windows, but it can only be exploited by a local attacker with valid credentials on the Windows system. Nonetheless, an attacker could load malicious DLL files or Windows software libraries that execute when Webex Teams launches. 

“A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user’s account,” Cisco explains. 

SEE: Cisco announces plans to acquire Kubernetes security player Portshift

Cisco Webex Teams for Windows releases 3.0.16269.0 and later are not vulnerable to the flaw. The flaw has a severity rating of 7.8 out of 10 and was reported by Hou JingYi of Qihoo 360 CERT.   

Cisco also disclosed 11 medium-severity bugs for products that should be patched or updated. These issues affect Cisco’s StarOS, SD-WAN vManage, Nexus Data Broker software, ISE, Industrial Network Director, Firepower Management Center, Expressway Series and Telepresence Video Communications Server, Email Security Appliance, Vision Dynamic Signage Director, and its Video Surveillance 8000 Series IP Cameras.

More on Cisco, networking and security


Source: Networking - zdnet.com

240+ Android apps caught showing out-of-context ads

Waterbear malware used in attack wave against government agencies