
=====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN523
_____________________________________________________________________

DATE                : 07/10/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Cisco AsyncOS for Cisco WSA,
              Cisco Small Business 220 Series Smart Switches firmware,
              Cisco Intersight Virtual Appliance software?
              Cisco ATA 190 Series On-Premises Software,
              Cisco ATA 190 Series Multiplatform (MPP) Software,
              Cisco Identity Services Engine,
           Linux, MacOS running Cisco AnyConnect Secure Mobility Client,
               Cisco Vision Dynamic Signage Director software,
               Cisco IP Phone Software,
      Cisco AsyncOS Software for Cisco Email Security Appliance (ESA),
             Cisco Orbital, Cisco Smart Software Manager On-Prem,
             Cisco DNA Center,
             Cisco TelePresence Collaboration Endpoint (CE) Software,
             Cisco RoomOS Software.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsi2-command-inject-CGyC8y2R
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-A4J57F3
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-UwqPrBM3
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-lib-hija-cAFB7x4q
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-xss-fvdj6HK
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-V4VSjEsX
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssm-priv-esc-5g35cdDJ
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-infodisc-KyC6YncS
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tpce-rmos-mem-dos-rck56tT
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disc-pNXtLhdp
_____________________________________________________________________

Below is the list of Cisco Security Advisories published by Cisco PSIRT
on 2021-October-06.

The following PSIRT security advisories (6 High, 10 Medium) were
published at 16:00 UTC today.

Table of Contents:

1) Cisco Web Security Appliance Proxy Service Denial of Service
Vulnerability - SIR: High

2) Cisco Small Business 220 Series Smart Switches Link Layer Discovery
Protocol Vulnerabilities - SIR: High

3) Cisco Intersight Virtual Appliance Command Injection Vulnerability -
SIR: High

4) Cisco ATA 190 Series Analog Telephone Adapter Software
Vulnerabilities - SIR: High

5) Cisco Identity Services Engine Privilege Escalation Vulnerability -
SIR: High

6) Cisco AnyConnect Secure Mobility Client for Linux and Mac OS with VPN
Posture (HostScan) Module Shared Library Hijacking Vulnerability - SIR: High

7) Cisco Business 220 Series Smart Switches Static Key and Password
Vulnerabilities - SIR: Medium

8) Cisco Vision Dynamic Signage Director Reflected Cross-Site Scripting
Vulnerability - SIR: Medium

9) Cisco IP Phone Software Arbitrary File Read Vulnerability - SIR: Medium

10) Cisco Identity Services Engine XML External Entity Injection
Vulnerability - SIR: Medium

11) Cisco Email Security Appliance URL Filtering Bypass Vulnerability -
SIR: Medium

12) Cisco Orbital Open Redirect Vulnerability - SIR: Medium

13) Cisco Smart Software Manager Privilege Escalation Vulnerability -
SIR: Medium

14) Cisco DNA Center Information Disclosure Vulnerability - SIR: Medium

15) Cisco TelePresence Collaboration Endpoint and  RoomOS Software
Denial of Service Vulnerability - SIR: Medium

16) Cisco Identity Services Engine Sensitive Information Disclosure
Vulnerability - SIR: Medium

+--------------------------------------------------------------------

1) Cisco Web Security Appliance Proxy Service Denial of Service
Vulnerability

CVE-2021-34698

SIR: High

CVSS Score v(3.1): 8.6

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-dos-fmHdKswk"]

+--------------------------------------------------------------------

2) Cisco Small Business 220 Series Smart Switches Link Layer Discovery
Protocol Vulnerabilities

CVE-2021-34775, CVE-2021-34776, CVE-2021-34777, CVE-2021-34778,
CVE-2021-34779, CVE-2021-34780

SIR: High

CVSS Score v(3.1): 8.8

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T"]

+--------------------------------------------------------------------

3) Cisco Intersight Virtual Appliance Command Injection Vulnerability

CVE-2021-34748

SIR: High

CVSS Score v(3.1): 8.8

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsi2-command-inject-CGyC8y2R
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsi2-command-inject-CGyC8y2R"]

+--------------------------------------------------------------------

4) Cisco ATA 190 Series Analog Telephone Adapter Software Vulnerabilities

CVE-2021-34710, CVE-2021-34735

SIR: High

CVSS Score v(3.1): 8.8

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-A4J57F3
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-A4J57F3"]

+--------------------------------------------------------------------

5) Cisco Identity Services Engine Privilege Escalation Vulnerability

CVE-2021-1594

SIR: High

CVSS Score v(3.1): 7.5

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-UwqPrBM3
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-UwqPrBM3"]

+--------------------------------------------------------------------

6) Cisco AnyConnect Secure Mobility Client for Linux and Mac OS with VPN
Posture (HostScan) Module Shared Library Hijacking Vulnerability

CVE-2021-34788

SIR: High

CVSS Score v(3.1): 7.0

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-lib-hija-cAFB7x4q
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-lib-hija-cAFB7x4q"]

+--------------------------------------------------------------------

7) Cisco Business 220 Series Smart Switches Static Key and Password
Vulnerabilities

CVE-2021-34744, CVE-2021-34757

SIR: Medium

CVSS Score v(3.1): 5.5

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX"]

+--------------------------------------------------------------------

8) Cisco Vision Dynamic Signage Director Reflected Cross-Site Scripting
Vulnerability

CVE-2021-34742

SIR: Medium

CVSS Score v(3.1): 6.1

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-xss-fvdj6HK
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-xss-fvdj6HK"]

+--------------------------------------------------------------------

9) Cisco IP Phone Software Arbitrary File Read Vulnerability

CVE-2021-34711

SIR: Medium

CVSS Score v(3.1): 5.5

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-arbfileread-NPdtE2Ow"]

+--------------------------------------------------------------------

10) Cisco Identity Services Engine XML External Entity Injection
Vulnerability

CVE-2021-34706

SIR: Medium

CVSS Score v(3.1): 6.4

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-V4VSjEsX
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-V4VSjEsX"]

+--------------------------------------------------------------------

11) Cisco Email Security Appliance URL Filtering Bypass Vulnerability

CVE-2021-1534

SIR: Medium

CVSS Score v(3.1): 5.8

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-url-bypass-sGcfsDrp"]

+--------------------------------------------------------------------

12) Cisco Orbital Open Redirect Vulnerability

CVE-2021-34772

SIR: Medium

CVSS Score v(3.1): 4.7

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU"]

+--------------------------------------------------------------------

13) Cisco Smart Software Manager Privilege Escalation Vulnerability

CVE-2021-34766

SIR: Medium

CVSS Score v(3.1): 5.4

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssm-priv-esc-5g35cdDJ
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssm-priv-esc-5g35cdDJ"]

+--------------------------------------------------------------------

14) Cisco DNA Center Information Disclosure Vulnerability

CVE-2021-34782

SIR: Medium

CVSS Score v(3.1): 4.3

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-infodisc-KyC6YncS
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-infodisc-KyC6YncS"]

+--------------------------------------------------------------------

15) Cisco TelePresence Collaboration Endpoint and  RoomOS Software
Denial of Service Vulnerability

CVE-2021-34758

SIR: Medium

CVSS Score v(3.1): 4.4

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tpce-rmos-mem-dos-rck56tT
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tpce-rmos-mem-dos-rck56tT"]

+--------------------------------------------------------------------

16) Cisco Identity Services Engine Sensitive Information Disclosure
Vulnerability

CVE-2021-34702

SIR: Medium

CVSS Score v(3.1): 4.3

URL:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disc-pNXtLhdp
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disc-pNXtLhdp"]


=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================


