Cisco Releases New Security Advisories - 20240718003¶
Overview¶
The WA SOC has been made aware of a number of critical-to-medium vulnerabilites released by Cisco across a range of products.
What is vulnerable?¶
Product(s) Affected | Version(s) | CVE | CVSS | Severity |
---|---|---|---|---|
Cisco Smart Software Manager | Versions before 8-202212 | CVE-2024-20419 | 10 | Critical |
Cisco Secure Email Gateway | The Content Scanner Tools version is earlier than 23.3.0.4823 | CVE-2024-20401 | 9.8 | Critical |
Cisco Secure Web Appliance | Versions before 14.5.3 MR (Jul 2024), 15.0 MR (Aug 2024), and 15.2.0-164 | CVE-2024-20435 | 8.8 | High |
RADIUS Protocol | RFC 2865 | CVE-2024-3596 | 8.1 | High |
Cisco Intelligent Node | Cisco iNode Software versions before 4.0.0 Cisco iNode Manager Software versions before 24.1 |
CVE-2024-20323 | 7.5 | High |
Cisco Small Business RV Series Router Firmware for RV340 and RV345 Dual WAN Gigabit VPN Routers | 1.0.03.24 or later (has reached end-of-life) | CVE-2024-20416 | 6.5 | Medium |
Cisco Secure Email Gateway | Versions before 14.2.3-027, and 15.0.0-097 | CVE-2024-20429 | 6.5 | Medium |
Cisco Webex App | Cloud-based software | CVE-2024-20395 CVE-2024-20396 |
6.4 5.3 |
Medium Medium |
Cisco Identity Services Engine Software | Versions before 3.1P10 (Jan 2025), 3.2P7 (Sep 2024), and 3.3P3 | CVE-2024-20296 | 4.7 | Medium |
Cisco Expressway Series | Versions before 15.0.2 | CVE-2024-20400 | 3.1 | Medium |
What has been observed?¶
The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability that is described for CVE-2024-20419. There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours... (refer Patch Management):