Skip to main content

Overview

  • Cisco SD-WAN vManage Software Unauthenticated Access to Messaging Services Vulnerability (High priority):  this could allow an unauthenticated, adjacent attacker who has access to the VPN0 logical network to also access the messaging service ports on an affected system.
  • Vulnerability in NVIDIA Data Plane Development Kit Affecting Cisco Products (High priority): a vulnerability in the network stack that can allow a remote attacker to cause denial of service and some impact to data integrity and confidentiality.
  • Cisco Webex Meetings App Character Interface Manipulation Vulnerability (Medium priority): could allow an unauthenticated, remote attacker to manipulate links or other content within the messaging interface.
  • Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers IPSec VPN Server Authentication Bypass Vulnerability (Medium priority): an attacker could exploit this vulnerability by logging in to the VPN from an affected device with crafted credentials.

Recommended Action

Affected organisations are encouraged to review the latest Cisco Security Advisories and apply the necessary updates.

If you have any concerns, or have been affected by a cyber-related issue, report it to us by submitting a Cyber Concerns Online Reporting Form.

Topics

  • Advisory
  • Vulnerability
  • Exploit
  • Patches and Updates