Experts from the IICS web applications security course reported the presence of a severe vulnerability that, if exploited, would allow remote attackers to hijack Cisco’s Industrial Network Director, developed for enterprise deployment. The company announced a patch to correct this flaw yesterday afternoon, noting that no workarounds are known so far, so it is necessary for system administrators to install the patch as soon as possible.
Industrial Network Director is a network management platform to visualize industrial assets, keep them safe and manage their operations. It seems that only the versions of the software prior to 1.6.0 are affected by this error.
In the vulnerability report, Cisco mentions: “The flaw exists due to the incorrect validation of the loaded files in the affected application; an attacker could exploit this flaw to authenticate on the compromised system and load an arbitrary file”. According to the web applications security course experts, exploiting this flaw could enable attackers to execute high-privilege arbitrary code.
Cisco had also recently launched a fix for a severe vulnerability in the TelePresence video conferencing system, as well as some updates for its Unified Communications Manager (UCM) products.
“A flaw in UCM authentication and the TelePresence server could allow an unauthenticated remote attacker to cause service outages for authenticated users, generating a denial of service (DoS) condition”, mentioned the company’s report.
On the other hand, a couple of days ago Cisco released a correction for a DoS vulnerability considered critical, reported the web applications security course experts. The flaw, reported last May, affects routers running vulnerable versions of the Cisco IOS XR software.
The company also published seven update patches for various moderate severity errors, report specialists from the International Institute of Cyber Security (IICS).
Cisco released several security patches over the past month, more than usual, starting with a critical vulnerability correction for the Elastic Services Controller users’ web interface; in addition, the company had to correct the flaw in the Cisco IOS XE operating system software that affected multiple routers, switches, and firewall deployments. According to company reports, there are still millions of devices and implementations exposed to this vulnerability.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.