Сisсо Сhаnnеl – Telegram
Сisсо Сhаnnеl
17.9K subscribers
2.13K photos
108 videos
579 files
27.6K links
Cisco News and Vulnerabilities
This channel is not official

Boost the channel!!
https://news.1rj.ru/str/Cisco?boost

More:

@PopPolls
@QubesOS 💻
@CiscoChat
@Net3A

t.me/Cisco/22556
Download Telegram
Wishing you and yours a joyful holiday season from all of us at Cisco!
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Corporations are integrating sustainability into operations and technology in response to market shifts and AI-era innovations.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
👍1
👍1
🎉1
🎉2
Splunk Platform at Cisco SVP and GM Mangesh Pimpalkhare draws on his Kilimanjaro climb to chart a course for growth in 2026.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
‘Tech Unnoscripted’ videos capture insights from the front lines of technology and business: the challenges, innovations, and best practices that translate to success.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Identity%20Services%20Engine%20XML%20External%20Entity%20Processing%20Information%20Disclosure%20Vulnerability%26vs_k=1

A vulnerability in the licensing features of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information. 
This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-PIC. An attacker could exploit this vulnerability by uploading a malicious file to the application. A successful exploit could allow the attacker to read arbitrary files from the underlying operating system that could include sensitive data that should otherwise be inaccessible even to administrators. To exploit this vulnerability, the attacker must have valid administrative credentials.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt

Security Impact Rating: Medium


CVE: CVE-2026-20029
Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Multiple%20Cisco%20Products%20Snort%203%20Distributed%20Computing%20Environment/Remote%20Procedure%20Call%20Vulnerabilities%26vs_k=1

Multiple Cisco products are affected by vulnerabilities in the processing of Distributed Computing Environment Remote Procedure Call (DCE/RPC) requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, which would result in an interruption of packet inspection.
For more information about these vulnerabilities, see the Details (https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Multiple%20Cisco%20Products%20Snort%203%20Distributed%20Computing%20Environment/Remote%20Procedure%20Call%20Vulnerabilities%26vs_k=1#details) section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH

Security Impact Rating: Medium


CVE: CVE-2026-20026,CVE-2026-20027
🎊Cheers to Your New Year Success with SPOTO! 🎆

Warmest wishes for 2026! May it be filled with achievement, growth, and breakthroughs.

🎁Start Your Year with the Gift of Progress! Turn your Cisco, PMP, CompTIA, AWS, and more certs into reality.

🔹Quickly Pass in 7 Days---Guarantee🚀 🔹Unlock exclusive New Year offers on all IT Certs—UP TO 50% OFF!

📚Download FREE Cisco Ebook & official guide: https://bit.ly/3DR0chS

🔗Try Free CCNA 200-301 Training Courses:
https://bit.ly/3vF5idk

🔗 Join for offers: https://chat.whatsapp.com/BEQ9WrfLnpg1SgzGQw69oM

🎓 Get 1-on-1 Exam Help Now:
📥☎️Contact Admin @spotolucy * for 100% real Cisco Exam Dump& study guide: https://wa.link/r04o3j
👍1