Cisco on Wednesday informed customers that security updates are available for several of the company’s products, including SD-WAN, Webex, Firepower, IoT Field Network Director, Identity Services Engine, and Small Business routers.
Only one vulnerability has been classified by the networking giant as “critical.” Tracked as CVE-2019-1651, the flaw affects the vContainer component in Cisco’s SD-WAN solution and it can be exploited by a remote, authenticated attacker to cause a DoS condition and possibly to execute arbitrary code with root privileges. Exploitation of the weakness requires sending a specially crafted file that triggers a buffer overflow.
Several other vulnerabilities, classified as “high severity” based on their CVSS score, have been addressed by Cisco in SD-WAN. This includes flaws that can be exploited to bypass authentication, escalate privileges on a device, and overwrite arbitrary files. In most cases, exploitation requires the attacker to authenticate on the targeted system.
Several “high severity” flaws have also been patched by Cisco in its Webex products, including a command execution issue in the Webex Teams client, and five code execution flaws in the Windows versions of Webex Network Recording Player and Webex Player.
Two serious vulnerabilities have also been patched in Cisco’s Small Business RV320 and RV325 routers. One of them allows a remote and unauthenticated attacker to obtain sensitive information, while the other can be exploited for arbitrary command injection, but exploitation requires admin privileges.
RedTeam Pentesting, the company credited by Cisco for finding the router vulnerabilities, has published some advisories of its own.
In its Firepower firewall, Cisco resolved a security bypass and DoS vulnerability that can be exploited remotely without authentication. A DoS issue has also been addressed in the Cisco IoT Field Network Director product.
Finally, a privilege escalation flaw that can be exploited to obtain “super admin” permissions has been fixed in the Identity Services Engine.
Cisco says there is no indication that any of the flaws patched this week have been exploited for malicious purposes. Many of the vulnerabilities were found by Cisco itself.
Related: Cisco Patches Privilege Escalation Vulnerability in Adaptive Security Appliance
Related: Cisco Warns of Zero-Day Vulnerability in Security Appliances
Related: Default Account Exposes Cisco Switches to Remote Attacks
Related: Cisco Patches Serious DoS Flaws in Email Security Appliance

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
- Barracuda Zero-Day Exploited to Deliver Malware for Months Before Discovery
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Zyxel Firewalls Hacked by Mirai Botnet
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations
- Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances
- OAuth Vulnerabilities in Widely Used Expo Framework Allowed Account Takeovers
Latest News
- Chrome 114 Released With 18 Security Fixes
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
- Breaking Enterprise Silos and Improving Protection
- Spyware Found in Google Play Apps With Over 420 Million Downloads
- Millions of WordPress Sites Patched Against Critical Jetpack Vulnerability
- Barracuda Zero-Day Exploited to Deliver Malware for Months Before Discovery
- PyPI Enforcing 2FA for All Project Maintainers to Boost Security
- Personal Information of 9 Million Individuals Stolen in MCNA Ransomware Attack
