Cisco has patched a critical input validation vulnerability in its UCS Central software.
Tag Archives: Cisco
Denial of Service and Memory Vulnerabilities Patched in Cisco IOS
Cisco released its semiannual set of patches for its Cisco IOS router and switch operating system. The patches address 16 vulnerabilities.
Cisco vulnerability could allow attackers to eavesdrop on private conversations
A vulnerability in Cisco’s SPA300 and SPA500 IP phones could allow hackers to eavesdrop on private conversations from anywhere in the world, reports The Register.
The post Cisco vulnerability could allow attackers to eavesdrop on private conversations appeared first on We Live Security.
Cisco vulnerability could allow attackers to eavesdrop on private conversations
A vulnerability in Cisco’s SPA300 and SPA500 IP phones could allow hackers to eavesdrop on private conversations from anywhere in the world, reports The Register.
The post Cisco vulnerability could allow attackers to eavesdrop on private conversations appeared first on We Live Security.
Cisco Small Business IP Phones Open to Remote Eavesdropping
Cisco is warning customers about several vulnerabilities in some of its IP phones that can allow an attacker to listen in on users’ conversations. The bug affects the Cisco SPA 300 and 500 Series IP phones. Cisco had confirmed the vulnerabilities, which were discovered by Chris Watts, a researcher at Tech Analysis in Australia, and is […]
Domain Shadowing Latest Angler Exploit Kit Evasion Technique
The Angler Exploit Kit has begun using domain shadowing as a technique to avoid detection and blocking, researchers at Cisco Talos said.
1,800 Domains Overtaken by Flash Zero Day
Researchers at Cisco say that a Flash zero day exploit has compromised 1,800 domains, the majority of those during a 48-hour period last week.
Report: Companies Still Not Patching Security Vulnerabilities
The Cisco 2015 Annual Security report shows that CISOs and other security personnel are confident about their strategies despite that they are not patching.
Inside Cryptowall 2.0 Ransomware
An analysis of Cryptowall 2.0 reveals that the ransomware relies on complex encryption routines and sandbox detection capabilities to survive. It also uses Tor for command and control, and can execute on 32- and 64-bit systems.
Two Cisco Products Vulnerable to POODLE Attack on TLS
Two of Cisco’s products are vulnerable to the POODLE attack via the TLS implementation in those products. The vulnerability affects Cisco’s Adaptive Security Appliance software and its Application Control Engine module. The POODLE attack was disclosed in October by researchers from Google, who discovered that if an attacker can force a vulnerable Web server to fall back from […]