Cisco next to turn up Spring4Shell-vulnerable products

By

Eight identified, 70 under investigation.

Cisco has joined the list of technology vendors identifying products carrying the Spring4Shell vulnerability.

Cisco next to turn up Spring4Shell-vulnerable products

Considering its vast product list, it will some time before the extent of its exposure is known, but the networking giant’s investigations have found eight products that will need remediation so far.

They are the CX Cloud agent software, Crosswork Optimisation Engine, Crosswork Zero Touch Provisioning, Edge Intelligence, WAN Automation Engine and WAN Automation Engine Live, Enterprise Chat and Email, and Virtualised Voice Browser.

Fixes are not yet available, with Cisco’s out-of-cycle advisory noting that the vendor “is continuing to evaluate the fix and will update the advisory as additional information becomes available”.

The advisory lists a further 70 products still under investigation.

Spring4Shell was first disclosed by VMware at the end of March, and exploit attempts began almost immediately.

Vendors already announcing patches for downstream products include VMware, PTC, and Jamf.

Spring4Shell is a ClassLoader access vulnerability related to the data binding used to populate an object from request parameters such as queries or forms. 

So far, the vulnerability is assessed as difficult to exploit, since it requires a vulnerable application to run on Apache Tomcat as a WAR (web application resource) deployment.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

"Widespread data theft" hits Salesforce customers via third party

"Widespread data theft" hits Salesforce customers via third party

Home Affairs adds SecOps to new cyber risk overhaul

Home Affairs adds SecOps to new cyber risk overhaul

Exetel fined $694k over system 'vulnerability' for mobile number porting

Exetel fined $694k over system 'vulnerability' for mobile number porting

Attackers weaponise Linux file names as malware vectors

Attackers weaponise Linux file names as malware vectors

Log In

  |  Forgot your password?