Telegram Web Link
Jio Platforms Limited, in collaboration with AMD, Cisco, and Nokia, is developing an Open Telecom AI Platform that integrates cutting-edge AI technologies, including various forms of AI and machine learning, to enhance telecom operations by improving network security and efficiency while reducing total cost of ownership.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Cisco Webex for BroadWorks Credential Exposure Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-credexp-xMN85y6?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Webex%20for%20BroadWorks%20Credential%20Exposure%20Vulnerability%26vs_k=1

A low-severity vulnerability in Cisco Webex for BroadWorks Release 45.2 could allow an unauthenticated, remote attacker to access data and credentials if unsecure transport is configured for the SIP communication.
This vulnerability is due to the exposure of sensitive information in the SIP headers.
A related issue could allow an authenticated user to access credentials in plain text in the client and server logs. 
A malicious actor could exploit this vulnerability and the related issue to access data and credentials and impersonate the user.
A configuration change to fix this vulnerability and the related issue has been pushed to Cisco Webex for BroadWorks. Cisco recommends that customers restart their Cisco Webex application to apply the configuration changes.
There is a workaround that addresses this vulnerability and the related issue.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-credexp-xMN85y6

Security Impact Rating: Informational
This media is not supported in your browser
VIEW IN TELEGRAM
Ukraine military forcing men to fight in the war by kidnapping them in broad daylight.
This media is not supported in your browser
VIEW IN TELEGRAM
Ukraine military forcing men to fight in the war by kidnapping them in broad daylight.
Samsoe Samsoe is redefining retail by seamlessly integrating tradition with technology, transforming the shopping experience.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Cisco Secure Client for Windows with Secure Firewall Posture Engine DLL Hijacking Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-dll-injection-AOyzEqSg?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Secure%20Client%20for%20Windows%20with%20Secure%20Firewall%20Posture%20Engine%20DLL%20Hijacking%20Vulnerability%26vs_k=1

A vulnerability in the interprocess communication (IPC) channel of Cisco Secure Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the Secure Firewall Posture Engine, formerly HostScan, is installed on Cisco Secure Client.
This vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to a specific Cisco Secure Client process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker must have valid user credentials on the Windows system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-dll-injection-AOyzEqSg

Security Impact Rating: High


CVE: CVE-2025-20206
Cisco TelePresence Management Suite Cross-Site Scripting Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-xss-vuln-WbTcYwxG?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20TelePresence%20Management%20Suite%20Cross-Site%20Scripting%20Vulnerability%26vs_k=1

A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.  
This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-xss-vuln-WbTcYwxG


Security Impact Rating: Medium


CVE: CVE-2025-20208
In a panel discussion at Mobile World Congress, experts explore the rich opportunities and deep challenges of AI in the telco space.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
This recognition underscores Cisco’s pioneering approach to payment solutions, sustainability initiatives and financial flexibility for businesses worldwide.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
[FREE Study Materials]Pass Your Cisco CCNA/CCNP/CCDE/CCIE Exam with SPOTO Dumps & Exam Service Now🏆

What we set apart:
100% Hot IT Certs Real Exam #Dumps
Flexible, on-demand online training
Hands-on Exercises
7/24 Tutor support


Study efficiently with all of the courses needed for your Cisco #certification exams.

*📚Download FREE Cisco Ebook & official guide: https://bit.ly/3DR0chS

🎉Enroll SPOTO 💯100% Pass #Cisco Dumps & Free Test:
https://bit.ly/40VjRVK

🔗Try Free CCNA 200-301 Training Courses:
https://bit.ly/3vF5idk

Connect with 2024 Cisco study Group:
https://chat.whatsapp.com/BX4ZpXvwvSW4Gv10lN9vux
📥☎️Contact Admin @spotolucy * for 100% real Cisco Exam Dump& study guide: https://wa.link/r04o3j
Forwarded from Network 3A
🤙Cisco community channel and group:
@Cisco
@CiscoChat

💥Other Cisco related Channels and groups:
@ciscoAcademy
@spotociscoclub

Qubes OS Community Channel and group:
@QubesOS
@QubesChat

Off topic chats:
@PublicChatrooms

Games:
@hamstEr_kombat_bot
@CatizenBot
@boinker_bot - addicting


Other Channels:
@telemojis
@TheTGTimes
@TVids - True Videos

▪️▫️▪️▫️▪️▫️▪️▫️▪️▫️▪️
Join @Net3A for more channels and groups.
2025/07/07 22:13:19
Back to Top
HTML Embed Code: