cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

avatar

Сisсо Сhаnnеl

Cisco News and Vulnerabilities This channel is not official Boost the channel!! https://t.me/Cisco?boost More: @PopPolls @QubesOS 💻 @CiscoChat @Net3A t.me/Cisco/22556

Show more
Advertising posts
15 326
Subscribers
+1024 hours
+587 days
+20630 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

09:04
Video unavailableShow in Telegram
716.91 MB
👍 3
Repost from Network 3A
🤙Cisco community channel and group: @Cisco @CiscoChat 💥Other Cisco related Channels and groups: @ciscoAcademy @spotociscoclub Qubes OS Community Channel and group: @QubesOS @QubesChat Off topic chats: @PublicChatrooms @PublicTestGroup Games: @hamstEr_kombat_bot @CatizenBot Other Channels: @telemojis @TheTGTimes ▪️▫️▪️▫️▪️▫️▪️▫️▪️▫️▪️ Join @Net3A for more channels and groups.
Show all...
👍 1
Nataliia Nahach explains how Cisco’s TOP program offered a transformative experience. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Show all...
👍 1
Photo unavailableShow in Telegram
👍 1
Show all...
Hamster Kombat

Just for you, we have developed an unrealistically cool application in the clicker genre, and no hamster was harmed! Perform simple tasks that take very little time and get the opportunity to earn money!

Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-l2services-2mvHdNuC?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20IOS%20XR%20Software%20Network%20Convergence%20System%20Denial%20of%20Service%20Vulnerability%26vs_k=1 A vulnerability in the handling of specific Ethernet frames by Cisco IOS XR Software for various Cisco Network Convergence System (NCS) platforms could allow an unauthenticated, adjacent attacker to cause critical priority packets to be dropped, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect classification of certain types of Ethernet frames that are received on an interface. An attacker could exploit this vulnerability by sending specific types of Ethernet frames to or through the affected device. A successful exploit could allow the attacker to cause control plane protocol relationships to fail, resulting in a DoS condition. For more information, see the Details (#details) section of this advisory. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-l2services-2mvHdNuC This advisory is part of the September 2024 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2024 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication (https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75416). Security Impact Rating: High CVE: CVE-2024-20317
Show all...
👍 1
Multiple Cisco Products Web-Based Management Interface Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-auth-bypass-QnTEesp?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Multiple%20Cisco%20Products%20Web-Based%20Management%20Interface%20Privilege%20Escalation%20Vulnerability%26vs_k=1 A vulnerability in the JSON-RPC API feature in ConfD that is used by the web-based management interfaces of Cisco Crosswork Network Services Orchestrator (NSO), Cisco Optical Site Manager, and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device. This vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-auth-bypass-QnTEesp Security Impact Rating: High CVE: CVE-2024-20381
Show all...
Choose a Different Plan

Your current plan allows analytics for only 5 channels. To get more, please choose a different plan.