<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cisco &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/vulnerability/cisco-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Thu, 22 Jan 2026 10:16:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>cisco &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cisco Unified Communications Zero-Day RCE Enables Root Access</title>
		<link>https://firsthackersnews.com/cisco-3/</link>
					<comments>https://firsthackersnews.com/cisco-3/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 22 Jan 2026 07:29:16 +0000</pubDate>
				<category><![CDATA[cisco]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[Zero0day]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11027</guid>

					<description><![CDATA[<p>Cisco has issued an urgent security alert after identifying a previously unknown remote code execution flaw being exploited</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisco-3/">Cisco Unified Communications Zero-Day RCE Enables Root Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cisco has issued an urgent security alert after identifying a <strong>previously unknown remote code execution flaw</strong> being exploited against its Unified Communications platforms. The vulnerability, tracked as <strong>CVE-2026-20045</strong>, enables attackers to compromise systems <strong>without authentication</strong> and ultimately obtain <strong>root-level control</strong>.</p>



<p>Cisco’s security response team has confirmed real-world attacks and advises customers to take immediate action.</p>



<h2 class="wp-block-heading"><strong>How the Attack Works</strong></h2>



<p>The issue originates in the web-based management interface, where <strong>HTTP request input is not properly validated</strong>.</p>



<p>Attackers can exploit this weakness by:</p>



<ul class="wp-block-list">
<li>Sending crafted HTTP requests to the management endpoint</li>



<li>Bypassing authentication controls</li>



<li>Executing commands on the operating system</li>



<li>Escalating privileges to full root access</li>
</ul>



<p>Because the flaw allows complete system takeover, Cisco classified it as <strong>Critical</strong>, prioritizing impact over traditional scoring metrics.</p>



<h2 class="wp-block-heading"><strong>Impacted Cisco Products</strong></h2>



<p>Cisco confirmed the following products are affected, independent of configuration:</p>



<figure class="wp-block-table"><table><thead><tr><th>Product</th><th>Tracking ID</th></tr></thead><tbody><tr><td>Unified Communications Manager</td><td>CSCwr21851</td></tr><tr><td>Unified CM SME</td><td>CSCwr21851</td></tr><tr><td>Unified CM IM &amp; Presence</td><td>CSCwr29216</td></tr><tr><td>Unity Connection</td><td>CSCwr29208</td></tr><tr><td>Webex Calling (Dedicated Instance)</td><td>CSCwr21851</td></tr></tbody></table></figure>



<p>Other Cisco UC components, including Contact Center-related platforms, are confirmed <strong>not vulnerable</strong>.</p>



<h2 class="wp-block-heading"><strong>Software Updates and Fix Availability</strong></h2>



<p>Cisco has released fixes for supported versions. Only the releases listed below are validated by Cisco PSIRT.</p>



<h3 class="wp-block-heading">Unified CM, IM&amp;P, SME, Webex Calling</h3>



<figure class="wp-block-table"><table><thead><tr><th>Version Stream</th><th>Fixed Release</th></tr></thead><tbody><tr><td>12.5</td><td>Upgrade required</td></tr><tr><td>14</td><td>14SU5 or patched 14SU4</td></tr><tr><td>15</td><td>15SU4 (March 2026) or interim patches</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Unity Connection</h3>



<figure class="wp-block-table"><table><thead><tr><th>Version Stream</th><th>Fixed Release</th></tr></thead><tbody><tr><td>12.5</td><td>Upgrade required</td></tr><tr><td>14</td><td>14SU5 or patched 14SU4</td></tr><tr><td>15</td><td>15SU4 (March 2026) or 15SU3</td></tr></tbody></table></figure>



<p>Cisco has observed attackers targeting unpatched deployments, likely using automated discovery techniques to locate exposed management interfaces. Environments supporting enterprise voice and collaboration services are particularly attractive targets.</p>



<p>The vulnerability has also been added to <strong>CISA’s Known Exploited Vulnerabilities catalog</strong>, increasing compliance pressure for affected organizations.</p>



<h2 class="wp-block-heading"><strong>What Cisco Recommends</strong></h2>



<p>Organizations should take the following steps immediately:</p>



<ul class="wp-block-list">
<li>Apply Cisco security updates or upgrade to fixed releases</li>



<li>Restrict access to management interfaces using network controls</li>



<li>Monitor HTTP activity for abnormal request patterns</li>



<li>Investigate systems for indicators of compromise</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisco-3/">Cisco Unified Communications Zero-Day RCE Enables Root Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cisco-3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Attackers Can Exploit Multiple Flaws in Cisco Unified CCX to Run Commands</title>
		<link>https://firsthackersnews.com/unified-ccx/</link>
					<comments>https://firsthackersnews.com/unified-ccx/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 18 Nov 2025 02:24:53 +0000</pubDate>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[cisco]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10656</guid>

					<description><![CDATA[<p>Cisco has revealed serious security vulnerabilities in Cisco Unified Contact Center Express (Unified CCX). These issues allow remote,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/unified-ccx/">Attackers Can Exploit Multiple Flaws in Cisco Unified CCX to Run Commands</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cisco has revealed serious security vulnerabilities in Cisco Unified Contact Center Express (Unified CCX). These issues allow remote, unauthenticated attackers to run commands, gain root-level access, and bypass authentication.</p>



<p>The problems come from weaknesses in the Java Remote Method Invocation (RMI) process and the CCX Editor application, posing major risks to enterprise contact centers.</p>



<h2 class="wp-block-heading"><strong>Vulnerability Details</strong></h2>



<p>Two critical flaws were found:</p>



<p><strong>1. CVE-2025-20354 – Remote Code Execution (CVSS 9.8)</strong><br>This issue affects the Java RMI process. Attackers can upload files without authentication and use them to run system commands and gain full root access.</p>



<p><strong>2. CVE-2025-20358 – Authentication Bypass (CVSS 9.4)</strong><br>This flaw affects the CCX Editor. Attackers can trick the system into accepting fake authentication, allowing them to create and run scripts with administrative privileges.</p>



<h3 class="wp-block-heading">Impact</h3>



<ul class="wp-block-list">
<li>All <strong>Cisco Unified CCX systems</strong> are affected, regardless of configuration.</li>



<li><strong>Packaged CCE</strong> and <strong>Unified CCE</strong> are <strong>not impacted</strong>.</li>



<li>The two vulnerabilities are independent and do <strong>not</strong> need to be chained.</li>
</ul>



<h2 class="wp-block-heading">Patches and Recommendations</h2>



<p>Cisco has released updates, and <strong>no workarounds exist</strong>. Organizations should apply patches immediately:</p>



<ul class="wp-block-list">
<li><strong>Unified CCX 12.5:</strong> Update to <strong>12.5 SU3 ES07 or later</strong></li>



<li><strong>Unified CCX 15.0:</strong> Update to <strong>15.0 ES01 or later</strong></li>
</ul>



<p>Systems running older versions (earlier than 12.5 SU3 or 15.0) are at high risk.</p>



<p>Cisco’s PSIRT reports no active attacks yet, but the ease of exploitation makes these vulnerabilities highly attractive to attackers.</p>



<ul class="wp-block-list">
<li>Check your current Unified CCX version and apply the required patches immediately.</li>



<li>Prioritize patching any system exposed to the internet.</li>



<li>Use temporary controls like network segmentation and limiting RMI access to trusted networks.</li>
</ul>



<p>These vulnerabilities allow full system compromise, so <strong>urgent action is required</strong> to secure affected deployments.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/unified-ccx/">Attackers Can Exploit Multiple Flaws in Cisco Unified CCX to Run Commands</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/unified-ccx/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco Catalyst Center Bug Lets Attackers Gain Higher Access</title>
		<link>https://firsthackersnews.com/cve-2025-20341/</link>
					<comments>https://firsthackersnews.com/cve-2025-20341/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 17 Nov 2025 05:48:35 +0000</pubDate>
				<category><![CDATA[cisco]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[CVE-2025-20341]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10651</guid>

					<description><![CDATA[<p>Cisco has released a warning about a newly discovered high-severity vulnerability (CVE-2025-20341) affecting the Cisco Catalyst Center Virtual</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2025-20341/">Cisco Catalyst Center Bug Lets Attackers Gain Higher Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cisco has released a warning about a newly discovered high-severity vulnerability (<strong>CVE-2025-20341</strong>) affecting the Cisco Catalyst Center Virtual Appliance. This flaw allows authenticated remote users to escalate their privileges to Administrator, giving them full control over the system.</p>



<p>The vulnerability exists because the appliance does not properly validate user-supplied input. As a result, even a user with the <strong>Observer role</strong>—the lowest level of access—can send crafted HTTP requests that bypass normal security checks. </p>



<p>Once exploited, attackers could create new accounts, modify system settings, or take over the appliance entirely.</p>



<h2 class="wp-block-heading"><strong>Which Deployments Are Affected?</strong></h2>



<p>Cisco confirms that the issue affects only the Virtual Appliance running on VMware ESXi.<br>The following are <strong>not impacted</strong>:</p>



<ul class="wp-block-list">
<li>Catalyst Center hardware appliances</li>



<li>Virtual Appliances deployed on AWS</li>
</ul>



<p>In terms of software versions:</p>



<ul class="wp-block-list">
<li><strong>Not affected:</strong> Versions earlier than <strong>2.3.7.3-VA</strong> and version <strong>3.1</strong></li>



<li><strong>Affected:</strong> Versions <strong>2.3.7.3-VA and later</strong></li>



<li><strong>Fixed version:</strong> Upgrade to <strong>2.3.7.10-VA or later</strong></li>
</ul>



<p>There are <strong>no temporary workarounds</strong>. An upgrade is the <strong>only</strong> way to eliminate the risk.</p>



<p>According to Cisco’s PSIRT team:</p>



<ul class="wp-block-list">
<li>No active exploitation has been detected</li>



<li>No public reports or attacks have been observed</li>



<li>The vulnerability was found internally during a TAC support case</li>
</ul>



<p>Even though it hasn’t been exploited yet, the ease of privilege escalation makes this a high-priority issue for organizations.</p>



<h2 class="wp-block-heading"><strong>Action Required</strong></h2>



<p>Cisco advises all customers using the affected Virtual Appliance to:</p>



<ol class="wp-block-list">
<li>Review the official Cisco security advisory</li>



<li>Check the running software version</li>



<li>Immediately apply the fixed release (<strong>2.3.7.10-VA or higher</strong>)</li>
</ol>



<p>Updating ensures the appliance cannot be compromised through this privilege escalation flaw and keeps the deployment aligned with Cisco’s security best practices.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2025-20341/">Cisco Catalyst Center Bug Lets Attackers Gain Higher Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cve-2025-20341/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco Webex Flaw Allows HTTP Response Tampering</title>
		<link>https://firsthackersnews.com/cisco-webex-flaw/</link>
					<comments>https://firsthackersnews.com/cisco-webex-flaw/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 22 May 2025 16:12:16 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[cisco]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[HTTP Response]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[Webex flaw]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10232</guid>

					<description><![CDATA[<p>Cisco has patched a security flaw (CVE-2025-20255) in its Webex Meetings service that could let attackers manipulate cached</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisco-webex-flaw/">Cisco Webex Flaw Allows HTTP Response Tampering</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cisco has patched a security flaw (CVE-2025-20255) in its Webex Meetings service that could let attackers manipulate cached HTTP responses. The bug was rated with a CVSS score of 4.3 (medium severity).</p>



<h2 class="wp-block-heading"><strong>Cisco Webex Flaw</strong></h2>



<p>The issue came from how the Webex client join services handled malicious HTTP requests. Security researcher Matthew B. Johnson (d3d) discovered and reported the vulnerability, known as an HTTP cache poisoning flaw.</p>



<p>Attackers could use this vulnerability to trick the server into caching a malicious response, which would then be served to other users. This could lead to misleading or harmful content being shown during meetings. Fortunately, Cisco has already fixed the problem on its cloud servers, so no customer action is needed.</p>



<h2 class="wp-block-heading"><strong>What is HTTP Cache Poisoning?</strong></h2>



<p>HTTP cache poisoning happens when an attacker sends a specially crafted request to a web server. If the server caches that response, other users may receive the attacker’s modified content.</p>



<p>In the case of Webex, the attack exploited how the system handled unkeyed inputs in HTTP requests—parts of the request that affect the response but are not considered when caching.</p>



<p>Because the vulnerability didn’t require authentication and was low in complexity, it could have been used widely if not patched quickly.</p>



<h2 class="wp-block-heading"><strong>Technical Details</strong></h2>



<ul class="wp-block-list">
<li><strong>Type</strong>: HTTP cache poisoning (CWE-349)</li>



<li><strong>Impact</strong>: Integrity (e.g., altered content served to users)</li>



<li><strong>Attack Complexity</strong>: Low</li>



<li><strong>User Interaction</strong>: Required</li>



<li><strong>Authentication</strong>: Not needed</li>



<li><strong>Affected Product</strong>: Cisco Webex Meetings (cloud-based only)</li>



<li><strong>CVSS Score</strong>: 4.3 (Medium)</li>
</ul>



<p>Cisco has secured its infrastructure, but administrators are encouraged to stay aware of how shared cache systems can be used in attacks like this.</p>



<h2 class="wp-block-heading"><strong>Mitigation</strong></h2>



<p>Cisco has already fixed this vulnerability in its cloud-based Webex Meetings platform, so users don’t need to take any action. According to Cisco’s advisory, “No user action is required,” and there are no available workarounds.</p>



<p>Cisco&#8217;s security team also confirmed that there was no sign of the bug being exploited in the wild.</p>



<p>Still, organizations using Webex should make sure they’re on the latest version of the service with the patch applied.</p>



<p>For extra protection against similar cache poisoning issues, security experts recommend validating all user inputs (especially in HTTP headers), configuring web caches carefully, and using HTTP response headers like <code>Vary</code> to manage how responses are cached.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisco-webex-flaw/">Cisco Webex Flaw Allows HTTP Response Tampering</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cisco-webex-flaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco Nexus Vulnerability Allows Malicious Command Injection</title>
		<link>https://firsthackersnews.com/cisco-nexus-vulnerability/</link>
					<comments>https://firsthackersnews.com/cisco-nexus-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 27 Feb 2025 18:09:42 +0000</pubDate>
				<category><![CDATA[cisco]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[CVE-2025-20161]]></category>
		<category><![CDATA[malicious command injection]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Nexus Vulnerability]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9712</guid>

					<description><![CDATA[<p>Cisco has released a critical advisory for a command injection vulnerability (CVE-2025-20161) affecting its Nexus 3000 and 9000</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisco-nexus-vulnerability/">Cisco Nexus Vulnerability Allows Malicious Command Injection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cisco has released a critical advisory for a command injection vulnerability (CVE-2025-20161) affecting its Nexus 3000 and 9000 Series switches running in standalone NX-OS mode.</p>



<h2 class="wp-block-heading"><strong>Cisco Nexus Vulnerability</strong></h2>



<p>This flaw allows authenticated local attackers with administrative privileges to execute arbitrary commands on the underlying operating system with root-level access.</p>



<p>The vulnerability was discovered by Cisco’s Advanced Security Initiatives Group (ASIG) during internal testing, highlighting the security risks tied to software image validation in enterprise network devices.</p>



<p>CVE-2025-20161 exists due to improper input validation during the software upgrade process in Cisco Nexus switches.</p>



<p>The devices fail to properly sanitize parts of the software image, allowing attackers to embed commands that run on the operating system.</p>



<p>This is a classic example of OS Command Injection (CWE-78), where untrusted input gets passed to system-level commands.</p>



<p>Exploiting this flaw requires valid administrator credentials, so the primary risks come from insider threats or compromised admin accounts.</p>



<p>The vulnerability has a CVSS score of 5.1 (Medium), but command injection in core infrastructure like data center switches could enable attackers to move laterally, steal data, or disrupt critical services.</p>



<p>The need for administrative credentials limits the attack surface but raises concerns about insider threats and credential management.</p>



<p>Organizations should audit Nexus switches and monitor logs for unauthorized upgrade attempts.</p>



<p>The vulnerability affects all Cisco Nexus 3000 and 9000 Series Switches running standalone NX-OS. Devices in ACI mode and other Cisco products are unaffected.</p>



<p>Cisco has released patches and urges immediate upgrades using the Cisco Software Checker tool.</p>



<p>No workarounds are available, so quick action is required.</p>



<p>Verifying software image integrity with cryptographic hashes before installation can help prevent risks from tampered files.</p>



<h2 class="wp-block-heading"><strong>Mitigations</strong></h2>



<p>Although CVE-2025-20161 has not been actively exploited, its potential impact requires immediate action. Network administrators should:</p>



<ul class="wp-block-list">
<li>Apply Cisco’s security updates using the official Software Checker portal.</li>



<li>Enforce strict access controls for administrative accounts.</li>



<li>Implement hash verification for all software images.</li>
</ul>



<p>Cisco’s proactive disclosure highlights the importance of maintaining rigorous patch management practices, especially since no workarounds exist.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisco-nexus-vulnerability/">Cisco Nexus Vulnerability Allows Malicious Command Injection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cisco-nexus-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco Vulnerability Allowed Attackers to Execute Commands as Root</title>
		<link>https://firsthackersnews.com/cve-2024-20418/</link>
					<comments>https://firsthackersnews.com/cve-2024-20418/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 08 Nov 2024 01:03:17 +0000</pubDate>
				<category><![CDATA[Security Update]]></category>
		<category><![CDATA[cisco]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[CVE-2024-20418]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[unauthenticated remote attackers]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9015</guid>

					<description><![CDATA[<p>A critical vulnerability in Cisco Unified Industrial Wireless Software, affecting Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points, has</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2024-20418/">Cisco Vulnerability Allowed Attackers to Execute Commands as Root</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical vulnerability in Cisco Unified Industrial Wireless Software, affecting Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points, has been discovered.</p>



<h2 class="wp-block-heading"><strong>CVE-2024-20418</strong></h2>



<p>Tracked as CVE-2024-20418, this flaw allows unauthenticated remote attackers to inject commands and execute arbitrary commands as the root user on affected devices.</p>



<p>The vulnerability is due to improper input validation in the web-based management interface. Exploiting it is straightforward; attackers can gain root access by sending specially crafted HTTP requests to the web interface.</p>



<p>Due to its high severity, this flaw has been assigned the maximum CVSS score of 10.0, highlighting its critical nature. It affects several products:</p>



<ul class="wp-block-list">
<li>Cisco Catalyst IW9165D Heavy-Duty Access Points</li>



<li>Cisco Catalyst IW9165E Rugged Access Points and Wireless Clients</li>



<li>Cisco Catalyst IW9167E Heavy-Duty Access Points</li>
</ul>



<p>These devices are vulnerable if running an affected software version with URWB operating mode enabled.</p>



<p>Cisco has released patches to fix the issue, and users should update immediately as no workarounds are available.</p>



<p>Cisco users can check vulnerability by running the “show mpls-config” CLI command. If this command is available, the device is likely affected; if unavailable, URWB mode is disabled, and the device is safe.</p>



<p>Due to the risk of full system compromise, organizations with affected products should prioritize patching.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2024-20418/">Cisco Vulnerability Allowed Attackers to Execute Commands as Root</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cve-2024-20418/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco Released Patches for Vulnerabilities Affecting Several Products</title>
		<link>https://firsthackersnews.com/cisco-patch-update/</link>
					<comments>https://firsthackersnews.com/cisco-patch-update/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 08 Sep 2022 14:02:56 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[cisco]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[affected products]]></category>
		<category><![CDATA[cisco patch]]></category>
		<category><![CDATA[DOS]]></category>
		<category><![CDATA[patch update]]></category>
		<category><![CDATA[remote attacker]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<category><![CDATA[vulnerable devices]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=5413</guid>

					<description><![CDATA[<p> Cisco has released updates to address vulnerabilities affecting multiple products. The vulnerability, identified as CVE-2022-28199 (CVSS 8.6), is due to improper error handling in</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisco-patch-update/">Cisco Released Patches for Vulnerabilities Affecting Several Products</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p> Cisco has released updates to address vulnerabilities affecting multiple products. </p>



<p>The vulnerability, identified as <a href="https://nvidia.custhelp.com/app/answers/detail/a_id/5389" target="_blank" rel="noopener">CVE-2022-28199</a> (CVSS 8.6), is due to improper error handling in the network stack of DPDK, which enables a remote attacker to cause a <strong>denial-of-service (DoS)</strong> scenario and affects data integrity and confidentiality. </p>



<p><strong>Cisco Products Affected by CVE-2022-28199 </strong></p>



<figure class="wp-block-table is-style-stripes"><table><tbody><tr><td><strong>Product</strong></td><td><strong>Fixed Release</strong></td></tr><tr><td>Cisco Catalyst 8000V Edge Software</td><td>17.6.4&nbsp;<br>17.7.2&nbsp;<br>17.9.1 and later&nbsp;<br>Note:&nbsp;Only the 17.6, 17.7, and 17.8 versions are affected.</td></tr><tr><td>Adaptive Security Virtual Appliance (ASAv)</td><td>9.17.1.x (release date TBD)&nbsp;<br>9.18.2&nbsp;<br>9.19.x and later&nbsp;<br>Note:&nbsp;Only the 9.17 and 9.18 versions are affected.</td></tr><tr><td>Secure Firewall Threat Defense Virtual (formerly FTDv)</td><td>7.1.0.3-x (release date TBD)&nbsp;&nbsp;<br>7.2.1.x (release date TBD)&nbsp;&nbsp;<br>7.3.x and later&nbsp;&nbsp;<br>Note:&nbsp;Only the 7.1 and 7.2 versions are affected.</td></tr></tbody></table></figure>



<p>They has also fixed a flaw identified as <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-msg-serv-AqTup7vs" target="_blank" rel="noopener">CVE-2022-20696</a> (CVSS 7.5) in <strong>Cisco SD-WAN vManage Software</strong>. A vulnerability in the binding configuration of Cisco SD-WAN vManage Software containers could allow an unauthenticated, adjacent attacker who has access to the VPN0 logical network to also access the messaging service ports on an affected system.</p>



<p>Another fix was issued for a flaw in the messaging interface of the <strong> Webex App</strong>. <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-qrtO6YC2" target="_blank" rel="noopener">CVE-2022-20863</a>.A vulnerability in the messaging interface of Cisco Webex App, formerly Webex Teams, could allow an unauthenticated, remote attacker to manipulate links or other content within the messaging interface.</p>



<p>However, Cisco explained there would be no patches for this flaw due to impacted products (<strong>RV110W, RV130, RV130W, and RV215W Routers</strong>) reaching end-of-life. The vulnerability is not critical, but it is recommended to migrate to a supported router series.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisco-patch-update/">Cisco Released Patches for Vulnerabilities Affecting Several Products</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cisco-patch-update/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
