Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Cisco Small Business 220 Series Smart Switches is vulnerable to a buffer overflow, caused by improper bounds checking when processing LLDP messages. By sending a specially-crafted LLDP packet, a remote attacker could overflow a buffer and execute arbitrary code or cause the device to reload unexpectedly.
Cisco Small Business 220 Series Smart Switches could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds read flaw when processing LLDP messages. By sending a specially-crafted LLDP packet, an attacker could exploit this vulnerability to cause corruption in the internal LLDP database to execute arbitrary code or cause the device to reload.
Cisco AnyConnect Secure Mobility Client for Linux and Mac OS could allow a local authenticated attacker to execute arbitrary code on the system, caused by a race condition in the signature verification process for shared library files. By sending specially-crafted interprocess communication (IPC) messages to the AnyConnect process, an attacker could exploit this vulnerability to execute arbitrary code with root privileges on the device.
Cisco Identity Services Engine (ISE) could allow a remote attacker to gain elevated privileges on the system, caused by improper input validation for specific API endpoints. By intercepting and modifying specific internode communications from one ISE persona to another ISE persona, an attacker could exploit this vulnerability to execute arbitrary commands with root privileges on the underlying operating system.
Cisco ATA 190 Series Analog Telephone Adapter Software is vulnerable to a denial of service, caused by improper rate limiting of ICMP packets on the Ethernet interface. By sending a specially-crafted steady stream of ICMP traffic, a remote attacker could exploit this vulnerability to cause the Ethernet port to go offline, and results in a denial of service condition.
Cisco ATA 190 Series Analog Telephone Adapter Software could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by improper input validation. By sending a specially-crafted request to the web UI, an attacker could exploit this vulnerability to execute arbitrary commands on the underlying OS with root privileges.
Cisco Intersight Virtual Appliance could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by improper input validation. By sending a specially-crafted input to the web-based management interface, an attacker could exploit this vulnerability to execute arbitrary commands using root-level privileges on the device.
Cisco Web Security Appliance (WSA) is vulnerable to a denial of service, caused by improper memory management in the proxy service. By establishing a large number of HTTPS connections, a remote attacker could exploit this vulnerability to cause the system to stop processing new connections, and results in a denial of service condition.
Refer to Cisco Advisory for patch, upgrade or suggested workaround information.
CVE-2021-34780 : CVE-2021-34779 : CVE-2021-34778 : CVE-2021-34777 : CVE-2021-34776 : CVE-2021-34775
CVE-2021-34788
CVE-2021-1594
CVE-2021-34735 : CVE-2021-34710
CVE-2021-34748
CVE-2021-34698