top of page

Cisco Warns of Critical Weakness in Network Security Tool That Exposes Users to Cyberattacks

tioudoppcandmonelu


A critical Cisco vulnerability exists in its administrative management tool for Cisco network security solutions. The flaw could allow an unauthenticated, remote attacker to gain administrative privileges on impacted devices.




Cisco Warns of Critical Network Security Tool Flaw



The flaw exists in the web-based management interface of the Cisco Firepower Management Center (FMC), which is its platform for managing Cisco network security solutions, like firewalls or its advanced malware protection service. Cisco has released patches for the vulnerability (CVE-2019-16028), which has a score of 9.8 out of 10 on the CVSS scale, making it critical in severity.


Fortinet released updates for a critical heap-based buffer overflow vulnerability in FortiOS SSL-VPN, which can be exploited to crash or possibly hijack equipment. The security vendor noted it's aware of "an instance" where this bug has been exploited, and it recommended "immediately validating your systems" against a list of indicators of compromise for the 9.3-rated flaw, tracked as CVE-2022-42475.


Firmware upgrades allow network administrators to utilize the latest features and security enhancements on their Meraki devices. The Cisco Meraki dashboard allows admins to easily schedule and reschedule firmware upgrades on their networks, opt in to beta firmware releases, view firmware change log notes, and set maintenance windows. This article outlines the functions of the firmware upgrades tool in the dashboard, as well as additional considerations for using and managing firmware.


Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services). The most urgent patch in this update is aimed at CVE-2022-20822.


A vulnerability scanner is an automated tool that identifies and creates an inventory of all IT assets (including servers, desktops, laptops, virtual machines, containers, firewalls, switches, and printers) connected to a network. For each asset, it also attempts to identify operational details such as the operating system it runs and the software installed on it, along with other attributes such as open ports and user accounts. A vulnerability scanner enables organizations to monitor their networks, systems, and applications for security vulnerabilities.


Most security teams utilize vulnerability scanners to bring to light security vulnerabilities in their computer systems, networks, applications and procedures. There are a plethora of vulnerability scanning tools available, each offering a unique combination of capabilities.


Across these different systems, CVE IDs give users a reliable way to recognize unique vulnerabilities and coordinate the development of security tools and solutions. The MITRE corporation maintains the CVE List, but a security flaw that becomes a CVE entry is often submitted by organizations and members of the open source community.


Vulnerability Assessment and Penetration Testing (VAPT) provides enterprises with a more comprehensive application evaluation than any single test alone. Using the Vulnerability Assessment and Penetration Testing (VAPT) approach gives an organization a more detailed view of the threats facing its applications, enabling the business to better protect its systems and data from malicious attacks. Vulnerabilities can be found in applications from third-party vendors and internally made software, but most of these flaws are easily fixed once found. Using a VAPT provider enables IT security teams to focus on mitigating critical vulnerabilities while the VAPT provider continues to discover and classify vulnerabilities.


Acunetix is a paid web application security scanner (open-source version also available) with many functionalities provided. Around 6500 vulnerabilities scanning range is available with this tool. In addition to web applications, it can also find vulnerabilities in the network as well.Acunetix provides the ability to automate your scan. Suitable for large scale organizations as it can handle many devices. HSBC, NASA, USA Air force are few industrial giants who use Arachni for vulnerability tests.


Nmap is one of the well-known free and open-source network scanning tools among many security professionals. Nmap uses the probing technique to discover hosts in the network and for operating system discovery.This feature helps in detecting vulnerabilities in single or multiple networks. If you are new or learning with vulnerabilities scanning, then Nmap is a good start.


OpenSCAP is a framework of tools that assist in vulnerability scanning, vulnerability assessment, vulnerability measurement, creating security measures. OpenSCAP is a free and open-source tool developed by communities. OpenSCAP only supports Linux platforms.OpenSCAP framework supports vulnerability scanning on web applications, web servers, databases, operating systems, networks, and virtual machines. Moreover, they provide a facility for risk assessment and support to counteract threats.


The tool is excellent for saving time, cost, and effort when it comes to managing your network security. It features an automated vulnerability assessment for DBs, web applications, workstations, and servers. Businesses and organizations will get complete support for virtual environments with things like virtual app scanning and vCenter integration. 2ff7e9595c


1 view0 comments

Recent Posts

See All

Comments


bottom of page