Weiterhin ist ein Fehler in der Selbstheilungsfunktion der IOS XE Embedded Wireless Controllers dafür verantwortlich, das sich Angreifer Root Rechte auf Access Points der Catalyst-Serie verschaffen können.
Eine Übersicht aller Sicherheitsupdates und der betroffenen Systeme finden Sie hier:
- Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst 9100 Series Access Points UDP Processing Denial of Service
- Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family DHCP Processing Denial of Service
- Cisco Wireless LAN Controller AireOS Software FIPS Mode Denial of Service
- Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service
- Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service
- Cisco IOS XE Software for Catalyst Switches MPLS Denial of Service
- Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Mobility Denial of Service
- Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation
- Cisco SD-WAN Software Privilege Escalation
- Cisco IOS and IOS XE Software SSH Denial of Service
- Cisco IOS XE Software IPv6 VPN over MPLS Denial of Service
- Cisco Catalyst 9100 Series Access Points Association Request Denial of Service
- Cisco SD-WAN Software Arbitrary File Corruption
- Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Disclosure
- Cisco IOS XE Software for Catalyst 9200 Series Switches Arbitrary Code Execution
- Cisco Duo for macOS Authentication Bypass
- Cisco IOS XE Software Web UI Command Injection
- Cisco Software-Defined Application Visibility and Control on Cisco vManage Authentication Bypass
- Cisco Software-Defined Application Visibility and Control on Cisco vManage Static Username and Password
- Cisco IOS XE ROM Monitor Software for Catalyst Switches Information Disclosure
- Cisco SD-WAN Arbitrary File Deletion