URL has been copied successfully!
Chained vulnerabilities in Cisco Catalyst switches could induce denialservice
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Chained vulnerabilities in Cisco Catalyst switches could induce denialservice

Vulnerable products and fixes: Cisco has addressed all four CVEs in its March 25 semiannual Cisco IOS and IOS XE Software Security Advisory. Although none of the individual CVSS scores are high (ranging from 4.8 for CVE-2026-20112 to 6.5 for CVE-2026-20110) the danger is amplified by the way the first two can be chained.Cisco’s Software Checker tool can be used to determine whether a switch is vulnerable by entering the software/firmware version currently in use.No workarounds are possible for CVE-2026-20114, CVE-2026-20112, or CVE-2026-20113. The highest-rated flaw, CVE-2026-20110, can be mitigated by setting the privilege level of the ‘start maintenance’ command manually from the command line interface, Cisco said.In February, Cisco made public a different series of vulnerabilities affecting the Catalyst SD-WAN Manager, CVE-2026-20122, CVE-2026-20126, and CVE-2026-20128. These allowed an attacker to elevate themselves to root and were assigned a CVSS score of 9.8 (‘critical’) with no workarounds possible.That same month Cisco also patched a vulnerability in its Catalyst SD-WAN Controller, CVE-2026-20127.This article first appeared on Network World.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/4150185/chained-vulnerabilities-in-cisco-catalyst-switches-could-induce-denial-of-service-2.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link