Cisco has released an update which addresses a trio of vulnerabilities in its IronPort line of products.
The company said that the flaws affect versions 6.2 and 6.5 of the IronPort Encryption appliance as well as IronPort PostX MAP. The company said that the IronPort C, M and S appliances were not believed to be vulnerable.
Cisco reported that two of the flaws, if exploited could allow an attacker to view sensitive system administration, while the third could allow an attacker to remotely execute code.
The first of the information disclosure flaws was found in the appliance's administration interface component, while the second vulernability was found in the WebSafe Servlet component.
The remote code execution vulnerability was found within the HTTPS server component. That vulnerability can be mitigated by restricting access to trusted IP addresses, the company said.
Administrators looking to obtain and install the fixes are advised to contact Cisco's IronPort technical support team.
Cisco warns of new security flaws
Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
Think Technology Australia deliver massive ROI to a Toyota dealership through SharePoint-powered, automated document management
Promoted Content
Why Australia’s Industrial Leaders Are Turning to Dynamic Aspect for Dynamics 365 Business Central
Promoted Content
Have ticket queues become your quiet business risk?
AI PCs shift from hype to revenue opportunity for partners
Shortfalls in cyber expertise deepen the cost and complexity of security incidents




