Rewterz Threat Advisory – Multiple McAfee ePolicy Orchestrator Vulnerabilities
November 5, 2021Rewterz Threat Advisory – ICS: Philips Tasy EMR Vulnerabilities
November 5, 2021Rewterz Threat Advisory – Multiple McAfee ePolicy Orchestrator Vulnerabilities
November 5, 2021Rewterz Threat Advisory – ICS: Philips Tasy EMR Vulnerabilities
November 5, 2021Severity
Medium
Analysis Summary
CVE-2021-34773
Multiple Cisco Unified Communications products are vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform unintended action. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2021-34731
Cisco Prime Access Registrar is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2021-40128
Cisco Webex Meetings could allow a remote attacker to conduct phishing attacks, caused by insufficient validation of user-supplied parameters. By sending a specially-crafted request, an attacker could exploit this vulnerability to direct the user to an attacker-controlled website.
CVE-2021-1500
Cisco Webex Video Mesh could allow a remote attacker to conduct phishing attacks, caused by improper input validation of the URL parameters in an HTTP request. By persuading a victim to click on a specially crafted link, an attacker could exploit this vulnerability to redirect a victim to arbitrary Web sites.
CVE-2021-34739
Cisco Small Business Series Switches could allow a remote attacker to launch a replay attack, caused by insufficient expiration of session credentials. By conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time, an attacker could exploit this vulnerability to conduct a replay attack and gain unauthorized access to the device.
CVE-2021-34701
Multiple Cisco Unified Communications products could allow a remote authenticated attacker to traverse directories on the system, caused by the improper validation of user input in the web-based management interface. By sending a specially crafted JHTTP request, an attacker could exploit this vulnerability to access sensitive files on the affected system.
CVE-2021-34741
Cisco Email Security Appliance is vulnerable to a denial of service, caused by insufficient input validation of incoming emails. By sending a specially-crafted email, a remote attacker could exploit this vulnerability to exhaust all the available CPU resources.
Impact
- Cross-SIte Scripting
- Unauthorized Access
Affected Vendors
Cisco
Affected Products
- Cisco Unified Communications Manager
- Cisco Unity Connection
- Cisco Unified Communications Manager IM & Presence Service
- Cisco Unified Communications Manager SME
- Cisco Prime Access Registrar
- Cisco Webex Video Mesh
- Cisco Small Business 300 Series Managed Switches
- Cisco Small Business 500 Series Stackable Managed Switches
- Cisco 350 Series Managed Switches
- Cisco 350X Series Stackable Managed Switches
- Cisco 550X Series Stackable Managed Switches
- Cisco ESW2 Series Advanced Switches
- Cisco Small Business 200 Series Smart Switches
- Cisco 250 Series Smart Switches
- Cisco Business 250 Series Smart Switches
- Cisco Business 350 Series Managed Switches
- Cisco Email Security Appliance
Remediation
Refer to Cisco Security Advisory for patch, upgrade or suggested workaround information.
CVE-2021-34773
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-csrf-xrTkDu3H
CVE-2021-34731
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-csrf-xrTkDu3H
CVE-2021-40128
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-activation-3sdNFxcy
CVE-2021-1500
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmesh-openred-AGNRmf5
CVE-2021-34739
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5
CVE-2021-34701
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-path-trav-dKCvktvO
CVE-2021-34741
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-dos-JOm9ETfO