Multiple vulnerabilities in the web-based management interface of Cisco Small Business 220 Series Smart Switches could allow an malicious user to do the following: Hijack a user session Execute arbitrary commands as a root user on the underlying operating system Conduct a cross-site scripting (XSS) attack Conduct an HTML injection attack For more information about these vulnerabilities, see the Details section of this advisory.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco sf220-24_firmware |
||
cisco sf220-24p_firmware |
||
cisco sf220-48_firmware |
||
cisco sf220-48p_firmware |
||
cisco sg220-26_firmware |
||
cisco sg220-26p_firmware |
||
cisco sg220-28mp_firmware |
||
cisco sg220-50_firmware |
||
cisco sg220-50p_firmware |
Cisco has flagged and patched several high-severity security vulnerabilities in its Cisco Small Business 220 Series Smart Switches that could allow session hijacking, arbitrary code execution, cross-site scripting and HTML injection.
It also issued fixes for high-severity problems in the AnyConnect secure mobility client, the Cisco DNA Center and the Cisco Email Security Appliance, along with a slew of patches for medium-severity vulnerabilities in AnyConnect, Jabber, Meeting Server, Unifi...