Cisco on Wednesday informed customers that security updates are available for several of the company’s products, including SD-WAN, Webex, Firepower, IoT Field Network Director, Identity Services Engine, and Small Business routers.
Only one vulnerability has been classified by the networking giant as “critical.” Tracked as CVE-2019-1651, the flaw affects the vContainer component in Cisco’s SD-WAN solution and it can be exploited by a remote, authenticated attacker to cause a DoS condition and possibly to execute arbitrary code with root privileges. Exploitation of the weakness requires sending a specially crafted file that triggers a buffer overflow.
Several other vulnerabilities, classified as “high severity” based on their CVSS score, have been addressed by Cisco in SD-WAN. This includes flaws that can be exploited to bypass authentication, escalate privileges on a device, and overwrite arbitrary files. In most cases, exploitation requires the attacker to authenticate on the targeted system.
Several “high severity” flaws have also been patched by Cisco in its Webex products, including a command execution issue in the Webex Teams client, and five code execution flaws in the Windows versions of Webex Network Recording Player and Webex Player.
Two serious vulnerabilities have also been patched in Cisco’s Small Business RV320 and RV325 routers. One of them allows a remote and unauthenticated attacker to obtain sensitive information, while the other can be exploited for arbitrary command injection, but exploitation requires admin privileges.
RedTeam Pentesting, the company credited by Cisco for finding the router vulnerabilities, has published some advisories of its own.
In its Firepower firewall, Cisco resolved a security bypass and DoS vulnerability that can be exploited remotely without authentication. A DoS issue has also been addressed in the Cisco IoT Field Network Director product.
Finally, a privilege escalation flaw that can be exploited to obtain “super admin” permissions has been fixed in the Identity Services Engine.
Cisco says there is no indication that any of the flaws patched this week have been exploited for malicious purposes. Many of the vulnerabilities were found by Cisco itself.
Related: Cisco Patches Privilege Escalation Vulnerability in Adaptive Security Appliance
Related: Cisco Warns of Zero-Day Vulnerability in Security Appliances
Related: Default Account Exposes Cisco Switches to Remote Attacks
Related: Cisco Patches Serious DoS Flaws in Email Security Appliance

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
