Zeitpunkt Nutzer Delta Tröts TNR Titel Version maxTL Fr 19.07.2024 13:58:59 7.212 -7 604.919 83,9 NerdCulture 4.2.10 1.000 Do 18.07.2024 00:01:10 7.219 +1 604.296 83,7 NerdCulture 4.2.10 1.000 Mi 17.07.2024 00:01:12 7.218 0 603.750 83,6 NerdCulture 4.2.10 1.000 Di 16.07.2024 00:01:11 7.218 +1 603.122 83,6 NerdCulture 4.2.10 1.000 Mo 15.07.2024 00:01:11 7.217 0 602.695 83,5 NerdCulture 4.2.10 1.000 So 14.07.2024 00:00:03 7.217 +1 602.204 83,4 NerdCulture 4.2.10 1.000 Sa 13.07.2024 00:00:07 7.216 +1 601.736 83,4 NerdCulture 4.2.10 1.000 Fr 12.07.2024 00:01:56 7.215 -1 601.162 83,3 NerdCulture 4.2.10 1.000 Do 11.07.2024 00:00:16 7.216 0 600.675 83,2 NerdCulture 4.2.10 1.000 Mi 10.07.2024 00:00:02 7.216 0 600.179 83,2 NerdCulture 4.2.10 1.000
Olly 👾 (@Olly42) · 01/2024 · Tröts: 239 · Folger: 27
Fr 19.07.2024 15:05
Critical Cisco Bug lets Threat Actors add root Users on SEG Devices.
Cisco has fixed a critical severity vulnerability that lets attackers add new users with root privileges and permanently crash Security Email Gateway (SEG) appliances using emails with malicious attachments.
#cisco #async #secure #email #software #vulnerable #fix #it #security #privacy #tech #technology #engineering #news
CVE-2024-20401 impacts SEG appliances if they're running a vulnerable Cisco AsyncOS release and the following conditions are met: •The file analysis feature (part of Cisco Advanced Malware Protection) or the content filter feature is enabled and assigned to an incoming mail policy. •The Content Scanner Tools version is earlier than 23.3.0.4823 The fix for this vulnerability is delivered to affected devices with the Content Scanner Tools package versions 23.3.0.4823 and later. The updated version is included by default in Cisco AsyncOS for Cisco Secure Email Software releases 15.5.1-055 and later.
[Öffentlich] Antw.: 0 Wtrl.: 0 Fav.: 0 · via Metatext