Articles tagged "Cisco"

Found 27 articles

Cisco has released patches for critical vulnerabilities found in its Webex and Identity Services Engine (ISE) products. These flaws could allow attackers to exploit the systems remotely, potentially impersonating users or executing unauthorized commands on the operating system. This poses a significant risk to organizations using these platforms, as it could lead to unauthorized access and data breaches. Users of Webex and ISE should prioritize applying these updates to safeguard their systems and data against potential attacks. Keeping software up to date is crucial in maintaining cybersecurity hygiene.

Impact: Webex, Identity Services Engine (ISE)
Remediation: Patches have been released; users should update to the latest versions as specified by Cisco.
Read Original

Researchers from Cisco Talos have found that attackers are exploiting the email notification systems of popular SaaS platforms like GitHub and Jira to distribute phishing and spam emails. By sending these malicious emails from the platforms' own servers, the attackers bypass standard email security measures such as SPF, DKIM, and DMARC. This tactic allows them to deliver phishing messages that appear legitimate, effectively tricking users into engaging with the content. This incident raises serious concerns for organizations using these platforms, as it highlights a potential vulnerability in their email communication processes. Users of GitHub and Jira should be particularly vigilant about unexpected emails, even if they seem to come from trusted sources.

Impact: GitHub, Jira
Remediation: Users should verify the authenticity of emails from GitHub and Jira, especially if they contain links or requests for sensitive information. Implementing additional email filtering and user education on recognizing phishing attempts are also recommended.
Read Original

Wireless networks in enterprises are becoming more complex, supporting a variety of devices and applications. However, this has led to a rise in security incidents, as highlighted by the 2026 Cisco State of Wireless report. Organizations are facing increased incident rates and higher costs, yet many are still investing heavily in wireless technology. Despite the growing risks, there seems to be a disconnect as IT professionals are not addressing these security challenges effectively. This situation raises concerns about the potential vulnerabilities within enterprise networks, making it crucial for organizations to reassess their security strategies.

Impact: Enterprise wireless networks, various devices and applications
Remediation: Organizations should reassess and enhance their wireless security strategies, invest in training for IT staff, and implement stronger security measures.
Read Original

A significant credential harvesting campaign has been detected, utilizing the React2Shell vulnerability (CVE-2025-55182) to gain access to sensitive data from 766 Next.js hosts. Attackers are stealing various credentials, including database logins, SSH private keys, AWS secrets, Stripe API keys, and GitHub tokens. This operation has been linked to a threat group that Cisco Talos is monitoring. The widespread nature of this breach is concerning, as it affects a range of developers and companies using Next.js, potentially compromising their applications and user data. Companies need to be vigilant and take immediate steps to secure their systems against this threat.

Impact: Next.js hosts, database credentials, SSH private keys, Amazon Web Services (AWS) secrets, Stripe API keys, GitHub tokens.
Remediation: Organizations should patch their systems to address the React2Shell vulnerability (CVE-2025-55182) and implement security best practices such as limiting access to sensitive credentials, regularly rotating keys and secrets, and monitoring for unauthorized access attempts.
Read Original

Cisco has addressed several critical and high-severity vulnerabilities that could potentially allow attackers to bypass authentication, execute malicious code, escalate privileges, and access sensitive data. The company released patches for two critical vulnerabilities and six high-severity issues, including CVE-2026-20093, which has a significant CVSS score indicating its severity. These vulnerabilities affect various Cisco products, making it crucial for users and organizations to apply the patches promptly. Failure to address these flaws could lead to unauthorized access and significant security breaches. It's important for companies to stay updated with security patches to mitigate these risks effectively.

Impact: Cisco products affected include unspecified software versions that utilize the vulnerable components.
Remediation: Cisco has released patches for the identified vulnerabilities. Users are advised to apply these patches as soon as they are available to prevent potential exploitation.
Read Original

Cisco has been targeted in a cyberattack that resulted in the theft of source code from its internal development environment. This breach was made possible through the use of stolen credentials linked to a prior supply chain attack on Trivy, a tool used for scanning container vulnerabilities. The attackers gained access to sensitive source code belonging not only to Cisco but also to its customers, raising serious concerns about the security of their products and services. This incident emphasizes the risks associated with credential theft and the potential for significant impacts on a wide range of users who rely on Cisco's technology. Companies should assess their security protocols to prevent similar breaches in the future.

Impact: Cisco source code, customer source code
Remediation: Companies should enhance credential security, implement multi-factor authentication, and conduct regular security audits.
Read Original

The Interlock ransomware group has been exploiting a severe zero-day vulnerability in Cisco Secure Firewall Management Center software, identified as CVE-2026-20131, since January 26, prior to its public disclosure. This vulnerability allows for insecure deserialization, which can lead to unauthorized access and potential takeover of affected systems. Organizations using Cisco's Secure Firewall Management Center should be particularly vigilant, as the attacks have been ongoing for over a month, posing a significant risk to network security. The situation emphasizes the urgent need for timely security updates and monitoring to protect against such exploitation.

Impact: Cisco Secure Firewall Management Center software, specifically affected versions that are vulnerable to CVE-2026-20131.
Remediation: Organizations should apply any available security patches from Cisco for the affected software. They should also review their configurations and consider implementing additional security measures to mitigate the risk of exploitation.
Read Original

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has alerted government agencies about two significant security vulnerabilities affecting the Synacor Zimbra Collaboration Suite (ZCS) and Microsoft Office SharePoint. Both flaws, identified as CVE-2025-66376 and another not specified in the article, have been found to be actively exploited by attackers. The CVE-2025-66376 vulnerability has a CVSS score of 7.2, indicating a moderate to high risk. Organizations using these platforms are urged to apply the necessary patches to protect against potential attacks. The exploitation of these vulnerabilities underscores the need for timely updates and vigilance in cybersecurity practices, especially for government entities.

Impact: Synacor Zimbra Collaboration Suite (ZCS), Microsoft Office SharePoint
Remediation: Government agencies are advised to apply patches for the vulnerabilities in Zimbra and SharePoint as soon as possible. Specific patch numbers or versions were not mentioned in the article.
Read Original

A significant vulnerability in Cisco's Catalyst SD-WAN, identified as CVE-2026-20133, poses a serious risk that some organizations may be overlooking. Cybersecurity experts have expressed concern that security teams are focusing their attention on another vulnerability, CVE-2026-20127, which is a zero-day exploit. This could lead to a dangerous situation where the high-severity flaw is not addressed, leaving systems vulnerable to potential attacks. Organizations using Cisco SD-WAN products should be aware of this oversight, as failing to remediate the CVE-2026-20133 vulnerability could expose critical data and systems to exploitation. The urgency of addressing this issue cannot be overstated, especially as cyber threats continue to evolve rapidly.

Impact: Cisco Catalyst SD-WAN products, specifically those affected by CVE-2026-20133.
Remediation: Organizations should prioritize patching their Cisco Catalyst SD-WAN systems and monitor for updates regarding CVE-2026-20133. Regular security assessments and a review of security practices are recommended to ensure all vulnerabilities are addressed.
Read Original

The Interlock ransomware gang has been actively exploiting a serious remote code execution vulnerability in Cisco's Secure Firewall Management Center (FMC) software since late January. This flaw, classified as having maximum severity, allows attackers to execute arbitrary code on affected systems, putting organizations at significant risk. Companies using this software should be particularly vigilant, as the vulnerability is being exploited in ongoing attacks. Cisco has not yet released a patch to address this issue, which raises concerns about the potential for widespread impact. Organizations relying on Cisco FMC should prioritize security measures and closely monitor any unusual activity to safeguard their networks.

Impact: Cisco Secure Firewall Management Center (FMC) software
Remediation: N/A
Read Original

Amazon Threat Intelligence has issued a warning regarding an active ransomware campaign known as Interlock, which is exploiting a significant vulnerability in Cisco's Secure Firewall Management Center (FMC) Software. This vulnerability, identified as CVE-2026-20131, has a maximum severity score of 10.0 and stems from an insecure deserialization of user-supplied Java byte streams. This flaw could allow attackers to gain root access without authentication, posing a serious risk to organizations using affected Cisco products. The exploitation of this vulnerability is concerning as it enables unauthorized access, potentially leading to data breaches and system compromises. Companies using Cisco FMC Software must take immediate action to protect their systems from this ongoing threat.

Impact: Cisco Secure Firewall Management Center (FMC) Software
Remediation: Organizations should immediately update their Cisco FMC Software to the latest version to mitigate this vulnerability. Additionally, they should review their security configurations and consider implementing network segmentation and access controls to limit exposure.
Read Original

Cisco's recent SD-WAN vulnerabilities have sparked confusion and some fraudulent activity among users. Some individuals are taking advantage of the situation by creating fake proof-of-concept (PoC) exploits, which has added to the chaos surrounding the bugs. This has led to misunderstandings about the actual risks posed by the vulnerabilities. As a result, companies using Cisco's SD-WAN products may be unsure about how to respond and protect their networks effectively. It’s crucial for organizations to be aware of these issues and seek accurate information to mitigate potential risks.

Impact: Cisco SD-WAN products
Remediation: Users should verify the authenticity of PoCs and stay updated with Cisco's official communications for guidance on addressing the vulnerabilities.
Read Original

Cisco has addressed 50 vulnerabilities in its firewall products, with two of them rated as critical, scoring a 10 out of 10 on the CVSS scale. These vulnerabilities could potentially allow attackers to exploit the system and gain unauthorized access. Organizations using Cisco firewall products are urged to apply the patches as soon as possible to mitigate the risks. Failure to address these vulnerabilities could lead to significant security breaches, putting sensitive data at risk. This incident emphasizes the ongoing need for vigilance in cybersecurity practices and timely updates to software.

Impact: Cisco firewall products
Remediation: Apply the latest patches provided by Cisco for the affected firewall products.
Read Original

Cisco has confirmed that two vulnerabilities in the Catalyst SD-WAN Manager are currently being exploited by attackers. The first vulnerability, identified as CVE-2026-20122, has a CVSS score of 7.1 and allows authenticated remote users to overwrite files on the local file system. This could lead to significant disruptions and unauthorized access to sensitive data. Organizations using the Catalyst SD-WAN Manager should take immediate action to address these vulnerabilities, as they pose a serious risk to network security. It’s crucial for affected users to monitor their systems closely and apply any available patches as soon as possible.

Impact: Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage)
Remediation: Organizations should apply patches as soon as they are available and ensure that all access controls are reviewed to prevent unauthorized access. Regularly updating the system and monitoring for unusual activity is also recommended.
Read Original

A new threat actor known as UAT-9921 has been targeting the technology and financial services sectors using a malware framework called VoidLink. Cisco Talos researchers discovered that UAT-9921 has been active since at least 2019, though this is the first time they have employed VoidLink in their attacks. The malware's modular design suggests it can be adapted for various purposes, raising concerns about its potential to evolve and impact a wide range of systems within these industries. Companies in the tech and finance sectors should be vigilant and enhance their security measures to defend against this emerging threat. The situation highlights the ongoing challenges organizations face in protecting sensitive information from sophisticated cyber attacks.

Impact: Technology and Financial Services sectors, systems using VoidLink malware
Remediation: Enhance security measures, monitor for suspicious activity, and apply the latest security updates.
Read Original
Page 1 of 2Next