Cisco has released an update which addresses a trio of vulnerabilities in its IronPort line of products.
The company said that the flaws affect versions 6.2 and 6.5 of the IronPort Encryption appliance as well as IronPort PostX MAP. The company said that the IronPort C, M and S appliances were not believed to be vulnerable.
Cisco reported that two of the flaws, if exploited could allow an attacker to view sensitive system administration, while the third could allow an attacker to remotely execute code.
The first of the information disclosure flaws was found in the appliance's administration interface component, while the second vulernability was found in the WebSafe Servlet component.
The remote code execution vulnerability was found within the HTTPS server component. That vulnerability can be mitigated by restricting access to trusted IP addresses, the company said.
Administrators looking to obtain and install the fixes are advised to contact Cisco's IronPort technical support team.
Cisco warns of new security flaws
By
Shaun Nichols
on Feb 12, 2010 12:37PM
Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
New Microsoft CSP rules? Here’s how MSPs can stay ahead with Ingram Micro
Shared Intelligence is the Real Competitive Edge Partners Enjoy with Crayon
How mandatory climate reporting is raising the bar for corporate leadership
Empowering Sustainability: Schneider Electric's Dedication to Powering Customer Success
MSPs with a robust data protection strategy will achieve market success
Sponsored Whitepapers
Cut through the SASE confusion
Stay protected as cyber threats evolve
Defend Your Network from the Next Generation of AI Threats
The race to AI advantage is on. Don’t let slow consulting projects hold you back.
The changing face of Australian distribution




