Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
Cisco Small Business 220 Series Smart Switches could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by improper parameter validation for TFTP configuration parameters. By using specially-crafted input for specific TFTP configuration parameters, an attacker could exploit this vulnerability to execute arbitrary commands as a root user on the underlying operating system.
Cisco Small Business 220 Series Smart Switches could allow a remote attacker to gain elevated privileges on the system, caused by the use of weak session management for session identifier values. By using reconnaissance methods to determine how to craft a valid session identifier, an attacker could exploit this vulnerability to take actions within the management interface with administrative privileges.
Cisco Small Business 220 Series Smart Switches are vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the web-based management interface. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Cisco Small Business 220 Series Smart Switches are vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim’s Web browser within the security context of the hosting site.
Cisco
Upgrade to the Cisco Small Business 220 Series Smart Switches firmware releases 1.2.0.6 and later from https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ciscosb-multivulns-Wwyb7s5E