Page 2 of 19 results (0.002 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

A vulnerability in the web-based dashboard of Cisco Umbrella could allow an authenticated, remote attacker to perform an email enumeration attack against the Umbrella infrastructure. This vulnerability is due to an overly descriptive error message on the dashboard that appears when a user attempts to modify their email address when the new address already exists in the system. An attacker could exploit this vulnerability by attempting to modify the user's email address. A successful exploit could allow the attacker to enumerate email addresses of users in the system. Una vulnerabilidad en el panel de control basado en la web de Cisco Umbrella podría permitir a un atacante remoto y autenticado llevar a cabo un ataque de enumeración de correos electrónicos contra la infraestructura de Umbrella. • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-user-enum-S7XfJwDE • CWE-209: Generation of Error Message Containing Sensitive Information CWE-210: Self-generated Error Message Containing Sensitive Information •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Multiple vulnerabilities in the Admin audit log export feature and Scheduled Reports feature of Cisco Umbrella could allow an authenticated, remote attacker to perform formula and link injection attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Múltiples vulnerabilidades en la funcionalidad Admin audit log export y la funcionalidad de Scheduled Reports de Cisco Umbrella, podrían permitir a un atacante remoto autenticado llevar a cabo ataques de inyección de fórmulas y enlaces en un dispositivo afectado. Para mayor información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-inject-gbZGHP5T • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

Multiple vulnerabilities in the Admin audit log export feature and Scheduled Reports feature of Cisco Umbrella could allow an authenticated, remote attacker to perform formula and link injection attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Múltiples vulnerabilidades en la funcionalidad Admin audit log export y la funcionalidad Scheduled Reports de Cisco Umbrella, podrían permitir a un atacante remoto autenticado llevar a cabo ataques de inyección de fórmulas y enlaces en un dispositivo afectado. Para mayor información sobre estas vulnerabilidades, consulte la sección Detalles de este aviso • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-inject-gbZGHP5T • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

A vulnerability in the web UI of Cisco Umbrella could allow an unauthenticated, remote attacker to negatively affect the performance of this service. The vulnerability exists due to insufficient rate limiting controls in the web UI. An attacker could exploit this vulnerability by sending crafted HTTPS packets at a high and sustained rate. A successful exploit could allow the attacker to negatively affect the performance of the web UI. Cisco has addressed this vulnerability. • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umb-dos-dgKzDEBP • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 4.4EPSS: 0%CPEs: 1EXPL: 0

A vulnerability in the automatic update process of Cisco Umbrella Roaming Client for Windows could allow an authenticated, local attacker to install arbitrary, unapproved applications on a targeted device. The vulnerability is due to insufficient verification of the Windows Installer. An attacker could exploit this vulnerability by placing a file in a specific location in the Windows file system. A successful exploit could allow the attacker to bypass configured policy and install unapproved applications. Una vulnerabilidad en el proceso de actualización automática de Cisco Umbrella Roaming Client para Windows, podría permitir a un atacante local autenticado instalar aplicaciones arbitrarias y no aprobadas en un dispositivo apuntado. • https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-umbrella-msi-install • CWE-345: Insufficient Verification of Data Authenticity •