Cisco security updates: Attackers can trigger alarms

Important updates close several vulnerabilities in Cisco Networks Analytics Manager and Webex Meetings Services, among others.

listen Print view
Update lettering

(Image: heise online)

2 min. read

Network equipment supplier Cisco protects several products against possible attacks. In the worst case, attackers can access systems as root users. However, this is not possible without further ado. Security patches are available for download.

Admins can find information on the secure versions in the articles linked below this message. So far, there have been no reports of ongoing attacks. Because Cisco hardware is used in central locations in companies, admins should not delay patching for too long.

As the RADIUS implementation in Identity Services Engine is defective, attackers can use this vulnerability (CVE-2025-20152 “high”) for a DoS attack. This should work without authentication and remotely. Attacks can be initiated via prepared RADIUS requests. In the end, reboots occur.

A vulnerability (CVE-2025-20113 “high”) in Unified Intelligence Center can lead to attackers gaining higher user rights. In the context of Secure Network Analytics Manager, attackers can even gain root rights (CVE-2025-20256 “medium”). However, they must first be an admin. Attackers can also trigger alarms at this point (CVE-2025-20257 “medium”).

Attackers can also manipulate data in Unified Contact Center Enterprise (CVE-2025-20242 “medium”).

Videos by heise

At the beginning of May, Cisco upgraded various products against root and DoS attacks.

List sorted by threat level in descending order:

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.