Known Vulnerabilities for Mobility Services Engine by Cisco

Listed below are 10 of the newest known vulnerabilities associated with "Mobility Services Engine" by "Cisco".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

More device details and information can be found at device.report here: Cisco Mobility Services Engine

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2018-0377 A vulnerability in the Open Systems Gateway initiative (OSGi) interface of Cisco Policy Suite before 18.1.0 could allow an un... 9.8 - CRITICAL 2018-07-18 2019-10-09
CVE-2018-0376 A vulnerability in the Policy Builder interface of Cisco Policy Suite before 18.2.0 could allow an unauthenticated, remote at... 9.8 - CRITICAL 2018-07-18 2019-10-09
CVE-2018-0375 A vulnerability in the Cluster Manager of Cisco Policy Suite before 18.2.0 could allow an unauthenticated, remote attacker to... 9.8 - CRITICAL 2018-07-18 2019-10-09
CVE-2018-0374 A vulnerability in the Policy Builder database of Cisco Policy Suite before 18.2.0 could allow an unauthenticated, remote att... 9.8 - CRITICAL 2018-07-18 2019-10-09
CVE-2018-0134 A vulnerability in the RADIUS authentication module of Cisco Policy Suite could allow an unauthenticated, remote attacker to ... 5.3 - MEDIUM 2018-02-08 2020-09-04
CVE-2018-0116 A vulnerability in the RADIUS authentication module of Cisco Policy Suite could allow an unauthenticated, remote attacker to ... 7.2 - HIGH 2018-02-08 2019-10-09
CVE-2016-9197 A vulnerability in the CLI command parser of the Cisco Mobility Express 2800 and 3800 Series Wireless LAN Controllers could a... 6.7 - MEDIUM 2017-04-07 2017-04-13
CVE-2015-4282 Cisco Mobility Services Engine (MSE) through 8.0.120.7 uses weak permissions for unspecified binary files, which allows local... 6.9 - MEDIUM 2015-11-06 2017-01-06
CVE-2015-4263 The Control and Provisioning functionality in Cisco Mobility Services Engine (MSE) 10.0(0.1) allows remote authenticated user... 4 - MEDIUM 2015-07-10 2016-12-28
CVE-2015-0673 Cisco Mobility Services Engine (MSE) 8.0(110.0) allows remote authenticated users to discover the passwords of arbitrary user... 4 - MEDIUM 2015-03-26 2015-09-04

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCiscoMobility Services Engine8.0_baseAllAllAll
ApplicationCiscoMobility Services Engine8.0\(110.0\)AllAllAll
HardwareCiscoMobility Services Engine8.0\(110.0\)AllAllAll
ApplicationCiscoMobility Services Engine7.6.132.0AllAllAll
ApplicationCiscoMobility Services Engine7.6.120.0AllAllAll
ApplicationCiscoMobility Services Engine7.6.100.0AllAllAll
ApplicationCiscoMobility Services Engine7.5.102.101AllAllAll
ApplicationCiscoMobility Services Engine7.4_baseAllAllAll
ApplicationCiscoMobility Services Engine7.4.121.0AllAllAll
ApplicationCiscoMobility Services Engine7.4.110.0AllAllAll
ApplicationCiscoMobility Services Engine7.4.100.0AllAllAll
ApplicationCiscoMobility Services Engine7.0_baseAllAllAll
ApplicationCiscoMobility Services Engine6.0_baseAllAllAll
ApplicationCiscoMobility Services Engine5.2_baseAllAllAll
ApplicationCiscoMobility Services Engine5.1_baseAllAllAll
ApplicationCiscoMobility Services Engine18.0.0AllAllAll
ApplicationCiscoMobility Services Engine13.1.0AllAllAll
ApplicationCiscoMobility Services Engine13.0.0AllAllAll
HardwareCiscoMobility Services Engine10.0\(0.1\)AllAllAll
HardwareCiscoMobility Services Engine-AllAllAll

Popular searches for Mobility Services Engine

Cisco DNA Spaces

www.cisco.com/c/en/us/solutions/enterprise-networks/dna-spaces/index.html

Cisco DNA Spaces Get more from your Cisco wireless network with Cisco b ` ^ DNA Spaces, including location analytics with behavior metrics, engagement toolkits, and APIs

www.cisco.com/c/en/us/solutions/enterprise-networks/connected-mobile-experiences/index.html www.cisco.com/c/en/us/solutions/enterprise-networks/connected-mobile-experiences/index.html www.cisco.com/en/US/products/ps9742/index.html www.cisco.com/go/cmx www.cisco.com/en/US/netsol/ns1205/index.html www.cisco.com/en/US/products/ps9742/index.html www.cisco.com/c/es_mx/solutions/enterprise-networks/connected-mobile-experiences/index.html www.cisco.com/c/en/us/products/wireless/mobility-services-engine/index.html www.cisco.com/c/en/us/products/wireless/mobility-services-engine/index.html Cisco Systems DNA Spaces (software) Application programming interface Analytics Wireless network Application software Internet of things Wireless Location-based service Performance indicator Windows Live Spaces Enterprise software Business Digitization Behavior Use case Resilience (network) Software development kit Computer network

Cisco Security Advisory: Cisco Mobility Services Engine Privilege Escalation Vulnerability

tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151104-privmse

Cisco Security Advisory: Cisco Mobility Services Engine Privilege Escalation Vulnerability 9 7 5A vulnerability in the installation procedure of the Cisco Mobility Services Engine MSE appliance could allow an authenticated, local attacker to escalate to the root level. The vulnerability is due to incorrect installation and permissions settings on binary files during the MSE physical or virtual appliance install procedure. An attacker could exploit this vulnerability by logging into the device and escalating their privileges. A successful exploit could allow the attacker to acquire root-level privileges and take full control of the device. Cisco CiscoSecurityAdvisory/ isco -sa-20151104-privmse

Cisco Systems Vulnerability (computing) Media Source Extensions System Architecture Evolution Computer security Exploit (computer security) Installation (computer programs) Superuser Security hacker Privilege (computing) Privilege escalation Authentication Windows Metafile vulnerability Binary file Software Subroutine Virtual appliance Login File system permissions Patch (computing)

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report