Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
On April 7th, 2021, Cisco announced two high rated and one critical vulnerability impacting the Cisco SD-WAN vManage Software. vManage software is used to centralize network management.
CVE-2021-1137 and CVE-2021-1480 (CVSS:7.8) are Privilege Escalation vulnerabilities that could be used by a previously authenticated actor to gain root privileges on the underlying operating system. More concerning is CVE-2021-1479 (CVSS:9.8); a Buffer Overflow vulnerability that allows an unauthenticated remote actor to execute code with root privileges on the underlying operating system.
While exploitation in the wild has not been identified at this time, the high criticality rating for CVE-2021-1479 is likely to draw attention from both researchers and threat actors. Organizations are strongly recommended to apply the relevant security patches as soon as possible.
What we’re doing about it
What you should do about it
CVE-2021-1479 (CVSS: 9.8) Cisco SD-WAN vManage Remote Management Buffer Overflow Vulnerability
CVE-2021-1137 & CVE-2021-1480 (CVSS: 7.8) Cisco SD-WAN vManage Privilege Escalation Vulnerability
Impacted Cisco SD-WAN vManage Versions: