Cisco cleared 14 vulnerabilities Wednesday covering multiple products.
Two vulnerabilities coming in at a high severity level were with Identity Services Engine (ISE) and Videoscape Distribution Suite for Television (VDS TV).
There were 12 other vulnerabilities all listed at the medium severity level.
ISE is a network security product used in the healthcare, telecommunications, financial, manufacturing, retail and education sectors.
VDS TV, formerly known as Content Delivery System for Television, is a virtual video infrastructure solution that allows service providers to deliver, store and stream video content to subscribers.
The vulnerability affecting ISE is in the product’s authentication module, which allows a remote attacker to bypass authentication, and possibly get privileges on the ISE administration portal.
“The vulnerability is due to improper handling of authentication requests and policy assignment for externally authenticated users. An attacker could exploit this vulnerability by authenticating with a valid external user account that matches an internal username and incorrectly receiving the authorization policy of the internal account,” Cisco said in its advisory.
Cisco ISE, ISE Express and ISE Virtual Appliance running versions 1.3, 1.4, 2.0.0, 2.0.1 or 2.1.0 suffer from the issue. A fix for the vulnerability is included in versions 1.4.0 patch 11, 2.0.0 patch 5, 2.0.1 patch 5, and 2.1.0 patch 2.
The vulnerability in VDS TV is in the cache server, which allows a remote, unauthenticated hacker to cause a denial-of-service (DoS) condition on the targeted appliance by sending it large amounts of inbound traffic.
“The vulnerability is due to excessive mapped connections exhausting the allotted resources within the system. An attacker could exploit this vulnerability by sending large amounts of inbound traffic to a device with the intention of overloading certain resources. A successful exploit could cause the device to reload, resulting in a DoS condition,” Cisco said in its advisory.
The vulnerability, for which there are no workarounds, has been addressed by Cisco with the release of TV Streamer Application 4.6(1).
Cisco found the two high-severity flaws and the company said there are no cases of attackers leveraging the issues at this time.