MA-974.092023: MyCERT Advisory - Cisco Security Advisories Published on 27 September 2023
1.0 Introduction
Recently, Cisco has released security advisories for vulnerabilities affecting multiple Cisco products.
2.0 Impact
A remote cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
3.0 Affected Products
Multiple Cisco products.
4.0 Recommendations
MyCERT encourages users and administrators to review the following advisories and apply the necessary updates:
1) Cisco Catalyst SD-WAN Manager Vulnerabilities - SIR: Critical
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z
2) Cisco IOS XE Software Web UI Command Injection Vulnerability - SIR: High
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdij-FzZAeXAy
3) Cisco IOS XE Software Layer 2 Tunneling Protocol Denial of Service Vulnerability - SIR: High
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-l2tp-dos-eB5tuFmV
4) Cisco IOS XE Software Application Quality of Experience and Unified Threat Defense Denial of Service Vulnerability - SIR: High
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appqoe-utd-dos-p8O57p5y
5) Cisco DNA Center API Insufficient Access Control Vulnerability - SIR: High
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ins-acc-con-nHAVDRBZ
6) Cisco IOS XE Software for ASR 1000 Series Aggregation Services Routers IPv6 Multicast Denial of Service Vulnerability - SIR: High
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlre-H93FswRz
7) Cisco IOS XE Software for Catalyst 3650 and Catalyst 3850 Series Switches Denial of Service Vulnerability - SIR: High
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cat3k-dos-ZZA4Gb3r
8) Cisco IOS and IOS XE Software Command Authorization Bypass Vulnerability - SIR: High
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaascp-Tyj4fEJm
9) Cisco IOS and IOS XE Software Cisco Group Encrypted Transport VPN Software Out-of-Bounds Write Vulnerability - SIR: Medium
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-getvpn-rce-g8qR68sx
10) Cisco Wireless LAN Controller AireOS Software Denial of Service Vulnerability - SIR: Medium
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-dos-YSmbUqX3
11) Cisco IOS XE Software for Wireless LAN Controllers Wireless Network Control Denial of Service Vulnerability - SIR: Medium
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-wncd-HFGMsfSD
12) Cisco Catalyst 9100 Access Points Denial of Service Vulnerability - SIR: Medium
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ
13) Cisco Access Point Software Uncontrolled Resource Consumption Vulnerability - SIR: Medium
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-capwap-DDMCZS4m
14) Cisco Catalyst SD-WAN Manager Web UI HTML Injection Vulnerability - SIR: Medium
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-html-3ZKh8d6x
Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact MyCERT through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my
5.0 References
MA-970.092023: MyCERT Advisory - Apple Releases Security Updates for iOS and macOS
1.0 Introduction
Recently, Apple has released security updates to address a vulnerability in multiple products.
2.0 Impact
A cyber threat actor could exploit this vulnerability to take control of an affected device.
3.0 Affected Products
4.0 Recommendations
MyCERT encourages users and administrators to review the following advisories and apply the necessary updates.
Kindly refer to the following:
- https://support.apple.com/en-us/HT213913
- https://support.apple.com/en-us/HT213914
- https://support.apple.com/en-us/HT213915
Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact MyCERT through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my
5.0 References
https://www.cisa.gov/news-events/alerts/2023/09/12/apple-releases-security-updates-ios-and-macos
MA-962.082023: MyCERT Advisory - Fortinet Releases Security Update for FortiOS
1.0 Introduction
Recently, Fortinet has released a security update to address a vulnerability (CVE-2023-29182) affecting FortiOS.
2.0 Impact
A remote attacker can exploit this vulnerability to take control of an affected system.
3.0 Affected Products
- FortiOS version 7.0.0 through 7.0.3
- FortiOS 6.4 all versions
- FortiOS 6.2 all versions
4.0 Recommendations
MyCERT encourages users and administrators to review the Fortinet security release [FG-IR-23-149] and apply the necessary updates.
Kindly refer to the following URL for more information: https://www.fortiguard.com/psirt/FG-IR-23-149
Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact MyCERT through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my
5.0 References
MA-955.072023: MyCERT Advisory - Fortinet Releases Security Update for FortiOS and FortiProxy
1.0 Introduction
Recrntly, Fortinet has released a security update to address a critical vulnerability (CVE-2023-33308) affecting FortiOS and FortiProxy.
2.0 Impact
A remote attacker can exploit this vulnerability to take control of an affected system.
3.0 Affected Products
FortiOS and FortiProxy
4.0 Recommendations
MyCERT encourages users and administrators to review the Fortinet security release FG-IR-23-183 and apply the necessary updates.
Kindly refer to https://www.fortiguard.com/psirt/FG-IR-23-183
Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact MyCERT through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my
5.0 References
https://www.fortiguard.com/psirt/FG-IR-23-183
MA-947.062023: MyCERT Advisory - Apple Releases Security Updates for Multiple Products
1.0 Introduction
Recently, Apple has released security updates to address vulnerabilities in multiple products.
2.0 Impact
An attacker could exploit some of these vulnerabilities to take control of an affected device:
- CVE-2023-32434: An integer overflow vulnerability in the Kernel that could be exploited by a malicious app to execute arbitrary code with kernel privileges.
- CVE-2023-32435: A memory corruption vulnerability in WebKit that could lead to arbitrary code execution when processing specially crafted web content.
3.0 Affected Products
- watchOS 8.8.1 - Apple Watch Series 3, Series 4, Series 5, Series 6, Series 7, and SE
- macOS Big Sur 11.7.8
- macOS Monterey 12.6.7
- iOS 15.7.7 and iPadOS 15.7.7 - iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later
- watchOS 9.5.2 -Apple Watch Series 4 and later
- macOS Ventura 13.4.1
- iOS 16.5.1 and iPadOS 16.5.1 - iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
4.0 Recommendations
MyCERT encourages users and administrators to review the following advisories and apply the necessary updates.
Kindly refer to the following URLs:
- watchOS 8.8.1 : https://support.apple.com/en-my/HT213808
- macOS Big Sur 11.7.8 : https://support.apple.com/en-my/HT213809
- macOS Monterey 12.6.7 : https://support.apple.com/en-my/HT213810
- iOS 15.7.7 and iPadOS 15.7.7 : https://support.apple.com/en-my/HT213811
- watchOS 9.5.2 : https://support.apple.com/en-my/HT213812
- macOS Ventura 13.4.1 : https://support.apple.com/en-my/HT213813
- iOS 16.5.1 and iPadOS 16.5.1 : https://support.apple.com/en-my/HT213814
Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
To update, please refer:
- Update your iPhone, iPad, or iPod touch: https://support.apple.com/en-my/HT204204
- Update Safari and macOS on Mac: https://support.apple.com/en-my/HT201541
- Enable background updates in macOS: https://support.apple.com/en-my/HT207005
For further enquiries, please contact MyCERT through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my
5.0 References
- https://www.cisa.gov/news-events/alerts/2023/06/22/apple-releases-security-updates-multiple-products
- https://thehackernews.com/2023/06/zero-day-alert-apple-releases-patches.html?m=1
- https://nvd.nist.gov/vuln/detail/CVE-2023-32434
- https://nvd.nist.gov/vuln/detail/CVE-2023-32435
- https://support.apple.com/en-my/HT201222
MA-942.062023: MyCERT Advisory - Fortinet Fixes Critical RCE Flaw in Fortigate SSL-VPN Devices
1.0 Introduction
Recently, Fortinet has released security updates to address a heap-based buffer overflow vulnerability CVE-2023-27997 in FortiOS and FortiProxy.
2.0 Impact
An attacker could exploit this vulnerability to take control of an affected system.
3.0 Affected Products
- FortiOS-6K7K version 7.0.10
- FortiOS-6K7K version 7.0.5
- FortiOS-6K7K version 6.4.12
- FortiOS-6K7K version 6.4.10
- FortiOS-6K7K version 6.4.8
- FortiOS-6K7K version 6.4.6
- FortiOS-6K7K version 6.4.2
- FortiOS-6K7K version 6.2.9 through 6.2.13
- FortiOS-6K7K version 6.2.6 through 6.2.7
- FortiOS-6K7K version 6.2.4
- FortiOS-6K7K version 6.0.12 through 6.0.16
- FortiOS-6K7K version 6.0.10
- FortiProxy version 7.2.0 through 7.2.3
- FortiProxy version 7.0.0 through 7.0.9
- FortiProxy version 2.0.0 through 2.0.12
- FortiProxy 1.2 all versions
- FortiProxy 1.1 all versions
- FortiOS version 7.2.0 through 7.2.4
- FortiOS version 7.0.0 through 7.0.11
- FortiOS version 6.4.0 through 6.4.12
- FortiOS version 6.2.0 through 6.2.13
- FortiOS version 6.0.0 through 6.0.16
4.0 Recommendations
MyCERT encourages users and administrators to review Fortinet security advisory FG-IR-23-097 and apply the necessary updates. For more information, see Fortinet's Analysis of CVE-2023-27997 and Clarifications on Volt Typhoon Campaign.
Kindly refer to the URLs below:
- Fortinet security advisory FG-IR-23-097 : https://www.fortiguard.com/psirt/FG-IR-23-097
- Fortinet's Analysis of CVE-2023-27997 and Clarifications on Volt Typhoon Campaign : https://www.fortinet.com/blog/psirt-blogs/analysis-of-cve-2023-27997-and-clarifications-on-volt-typhoon-campaign
Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact MyCERT through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my
5.0 References
MA-918.042023: MyCERT Advisory - Apple Releases Security Updates for Multiple Products
1.0 Introduction
Recently, Apple has released security updates to address vulnerabilities in multiple products.
2.0 Impact
An attacker could exploit some of these vulnerabilities to take control of an affected device.
3.0 Affected Products
- macOS Ventura 13.3
- Safari 16.4
- Studio Display Firmware Update 16.4
- iOS 15.7.4 and iPadOS 15.7.4
- tvOS 16.4
- macOS Big Sur 11.7.5
- iOS 16.4 and iPadOS 16.4
- macOS Monterey 12.6.4
- watchOS 9.4
4.0 Recommendations
MyCERT encourages users and administrators to review the following advisories and apply the necessary updates.
- macOS Ventura 13.3 : https://support.apple.com/en-us/HT213670
- Safari 16.4 : https://support.apple.com/en-us/HT213671
- Studio Display Firmware Update 16.4 : https://support.apple.com/en-us/HT213672
- iOS 15.7.4 and iPadOS 15.7.4 : https://support.apple.com/en-us/HT213673
- tvOS 16.4 : https://support.apple.com/en-us/HT213674
- macOS Big Sur 11.7.5 : https://support.apple.com/en-us/HT213675
- iOS 16.4 and iPadOS 16.4 : https://support.apple.com/en-us/HT213676
- macOS Monterey 12.6.4 : https://support.apple.com/en-us/HT213677
- watchOS 9.4 : https://support.apple.com/en-us/HT213678
Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact MyCERT through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my
5.0 References
MA-913.032023: MyCERT Advisory - Apple Releases Security Updates for Multiple Products
1.0 Introduction
Recently, Apple has released security updates to address vulnerabilities in multiple products.
2.0 Impact
An attacker could exploit some of these vulnerabilities to take control of an affected device.
3.0 Affected Products
- Safari 16.3
- iOS 12.5.7
- macOS Monterey 12.6.3
- macOS Big Sur 11.7.3
- watchOS 9.3
- iOS 15.7.3 and iPadOS 15.7.3
- iOS 16.3 and iPadOS 16.3
- macOS Ventura 13.2
4.0 Recommendations
MyCERT encourages users and administrators to review the Apple security updates page for the following products and apply the necessary updates as soon as possible:
- Safari 16.3 : https://support.apple.com/en-us/HT213600
- iOS 12.5.7 : https://support.apple.com/en-us/HT213597
- macOS Monterey 12.6.3 : https://support.apple.com/en-us/HT213604
- macOS Big Sur 11.7.3 : https://support.apple.com/en-us/HT213603
- watchOS 9.3 : https://support.apple.com/en-us/HT213599
- iOS 15.7.3 and iPadOS 15.7.3 : https://support.apple.com/en-us/HT213598
- iOS 16.3 and iPadOS 16.3 : https://support.apple.com/en-us/HT213606
- macOS Ventura 13.2 : https://support.apple.com/en-us/HT213605
Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact MyCERT through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my
5.0 References
MA-910.022023: MyCERT Advisory - Apple Releases Security Updates for Multiple Products
1.0 Introduction
Recently, Apple has released security updates to address vulnerabilities in multiple products.
2.0 Impact
An attacker could exploit these vulnerabilities to take control of an affected device.
3.0 Affected Products
• Safari 16.3.1
• iOS 16.3.1 and iPadOS 16.3.1
• macOS 13.2.1
4.0 Recommendations
MyCERT encourages users and administrators to review the Apple security updates page for the following products and apply the necessary updates as soon as possible:
• Safari 16.3.1 - https://support.apple.com/kb/HT213638
• iOS 16.3.1 and iPadOS 16.3.1 - https://support.apple.com/kb/HT213635
• macOS 13.2.1 - https://support.apple.com/kb/HT213633
Generally, MyCERT advises the users of this devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact MyCERT through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my
5.0 References
https://www.cisa.gov/uscert/ncas/current-activity/2023/02/14/apple-releases-security-updates-multiple-products
MA-896.122022: MyCERT Advisory - Apple Releases Security Updates for Multiple Products
1.0 Introduction
Apple has released security updates to address vulnerabilities in multiple products.
2.0 Impact
An attacker could exploit some of these vulnerabilities to take control of an affected device.
3.0 Affected Products
- Safari 16.2
- iCloud for Windows 14.1
- macOS Monterey 12.6.2
- macOS Big Sur 11.7.2
- tvOS 16.2
- watchOS 9.2
- iOS 15.7.2 and iPadOS 15.7.2
- iOS 16.2 and iPadOS 16.2
- macOS Ventura 13.1
4.0 Recommendations
MyCERT encourages users and administrators to review the Apple security updates page for the following products and apply the necessary updates as soon as possible.
The Apple security updates page is available at:
https://support.apple.com/en-us/HT201222
Generally, MyCERT advises the users of these devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please get in touch with MyCERT through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 09:00 -18:00 MYT
Web: https://www.mycert.org.my
Twitter: https://twitter.com/mycert
Facebook: https://www.facebook.com/mycert.org.my
5.0 References