dumps4download.us

Monday, 30 July 2018


Cisco Patches High-Severity Bug in VoIP Phones




Cisco also patched three medium-security flaws in its network security offerings; and, it issued a fix for a high-severity bug in its platform for mobile operator routers, StarOS.
A range of business customers could be impacted by a high-severity security flaw discovered in Cisco VoIP phones. The vendor issued a patch on Wednesday.
Cisco also patched two medium-security flaws today in its FireSIGHT management platform for network security; and one medium-severity issue in the Web Security Appliance. Finally, it issued a fix for a high-severity bug in its platform for mobile operator routers, StarOS.
The most critical of the flaws, CVE-2018-0341, would allow command injection and remote code execution on IP phones, including higher-end models that have HD video call functionality. The advisory said that thanks to insufficient input validation, an authenticated user could send specially crafted shell commands to a specific user input field using the web-based user interface that links to the handsets. That could result in the ability to inject and execute arbitrary shell commands, opening the door for attackers to eavesdrop on conversations, intercept rich media data, place phone calls and more.
The vulnerability, found internally by the vendor, affects IP Phone 6800, 7800 and 8800 series devices that run a Multiplatform Firmware release prior to Release 11.2(1). No exploits have yet been seen in the wild, Cisco said – and the requirement for an attacker to be logged into the user interface in order to launch an attack somewhat mitigates the severity of the issue.
Cisco also sent out fixes for two medium-severity flaws in the Cisco FireSIGHT System Software, which provides centralized management for network security and operational functions for Cisco ASA with FirePOWER services and Cisco FirePOWER network security appliances. It automatically aggregates and correlates cyber-threat information for business users.
The first issue is a file policy bypass vulnerability (CVE-2018-0383), found in the detection engine of FireSIGHT. An unauthenticated, remote attacker could send a maliciously crafted FTP connection to transfer a file to an affected device; that file could carry malware built to disable the detection mechanisms in the system or carry out other nefarious actions.
“A successful exploit could allow the attacker to bypass a file policy that is configured to apply the ‘block upload’ with reset action to FTP traffic,” the vendor said.
The second vulnerability (CVE-2018-0384) in same detection engine could allow an unauthenticated, remote attacker to bypass a URL-based access control policy that is configured to block traffic for an affected system.
“The vulnerability exists because the affected software incorrectly handles TCP packets that are received out of order when a TCP SYN retransmission is issued,” the vendor explained. “An attacker could exploit this vulnerability by sending a maliciously crafted connection through an affected device. A successful exploit could allow the attacker to bypass a URL-based access control policy that is configured to block traffic for the affected system.”
Another medium-severity flaw (CVE-2018-0366) is a cross-site scripting vulnerability in the web-based management interface of the Cisco Web Security Appliance.
Using social engineering, a malicious actor could convince an interface user to click a specially crafted link that would then give threat actors the ability to execute arbitrary script code in the context of the interface, or allow the attacker to access sensitive browser-based information.
Meanwhile, Cisco has also patched a high-severity StarOS IPv4 fragmentation denial-of-service vulnerability (CVE-2018-0369). StarOS powers next-generation mobile networks, which support everything from tablets and smartphones to connected cars, smart-city and other IoT deployments. The platform provides virtualization and intelligence for mobile network architectures, and allows dynamic resource allocation for mobile services and networks to help wireless carriers manage their bandwidth to deliver higher levels of service to consumers and businesses.
Internal security testing uncovered a vulnerability in the reassembly logic for fragmented IPv4 packets of Cisco StarOS running on virtual platforms. An exploit could allow an unauthenticated, remote attacker to trigger a reload of the npusim process, resulting in a DoS condition, the vendor said.
“There are four instances of the npusim process running per Service Function (SF) instance, each handling a subset of all traffic flowing across the device,” it explained in the advisory. “It is possible to trigger a reload of all four instances of the npusim process around the same time.”
The result would be mobile service interruption, which would be felt by everyday users as a short connectivity glitch.
“An exploit could allow the attacker to trigger a restart of the npusim process, which will result in all traffic queued toward this instance of the npusim process to be dropped while the process is restarting,” the advisory added. “The npusim process typically restarts within less than a second.”
This vulnerability affects the Cisco Virtualized Packet Core-Single Instance (VPC-SI), the Cisco Virtualized Packet Core-Distributed Instance (VPC-DI) and the Cisco Ultra Packet Core (UPC), if they’re running any release of the StarOS operating system prior to the first fixed release. The Cisco ASR 5000 series routers, Cisco Elastic Services Controllers (ESC) and Cisco Ultra Automation Services (UAS) are not affected. Also, no exploits have been seen in the wild.



Monday, 19 February 2018

Pass 2018 210-255 Final Exam - Cisco 210-255 Exam Updated Study Material

Question No : 1
Which identifies both the source and destination location?

A. IP address
B. URL
C. ports
D. MAC address

Answer: A  

Question No : 2

Which data type is protected under the PCI compliance framework?

A. credit card type
B. primary account number
C. health conditions
D. provision of individual care

Answer: A

Pass 210-255 Exam in First Attempt - Cisco 210-255 Real Exam Questions



Question No : 3
Which type of analysis assigns values to scenarios to see what the outcome might be in
each scenario?

A. deterministic
B. exploratory
C. probabilistic
D. descriptive

Answer: A

Question No : 4
Which element can be used by a threat actor to discover a possible opening into a target network and can also be used by an analyst to determine the protocol of the malicious traffic?

A. TTLs
B. ports
C. SMTP replies
D. IP addresses

Answer: B

Preparing Tips For Cisco 210-255 Final Exam - 210-255 Dumps PDF Dumps4download


Question No : 5
Which option is generated when a file is run through an algorithm and generates a string specific to the contents of that file?

A. URL
B. hash
C. IP address
D. destination port

Answer: B

Question No : 6
You see confidential data being exfiltrated to an IP address that is attributed to a known Advanced Persistent Threat group. Assume that this is part of a real attach and not a network misconfiguration. Which category does this event fall under as defined in the Diamond Model of Intrusion?

A. reconnaissance
B. weaponization
C. delivery
D. action on objectives

Answer: A

Free 210-255 2018 Exam Dumps - Cisco 210-255 Braindumps Dumps4download.us



Question No : 7
Which information must be left out of a final incident report?

A. server hardware configurations
B. exploit or vulnerability used
C. impact and/or the financial loss
D. how the incident was detected

Answer: A

Question No : 8
Which of the following can be identified by correlating DNS intelligence and other security aevents? (Choose two.)

A. Communication to CnC servers
B. Configuration issues
C. Malicious domains based on reputation
D. Routing problems

Answer: A,C

Verified Cisco 210-255 Study Material - 210-255 Exam Dumps Dumps4Download.us



Question No : 9
Refer to the following packet capture. Which of the following statements is true about this
packet capture?
00:00:04.549138 IP omar.cisco.com.34548 > 93.184.216.34.telnet: Flags [S], seq
3152949738, win 29200,
options [mss 1460,sackOK,TS val 1193148797 ecr 0,nop,wscale 7], length 0
00:00:05.547084 IP omar.cisco.com.34548 > 93.184.216.34.telnet: Flags [S], seq
3152949738, win 29200,
options [mss 1460,sackOK,TS val 1193149047 ecr 0,nop,wscale 7], length 0
00:00:07.551078 IP omar.cisco.com.34548 > 93.184.216.34.telnet: Flags [S], seq
3152949738, win 29200,
options [mss 1460,sackOK,TS val 1193149548 ecr 0,nop,wscale 7], length 0
00:00:11.559081 IP omar.cisco.com.34548 > 93.184.216.34.telnet: Flags [S], seq
3152949738, win 29200,
options [mss 1460,sackOK,TS val 1193150550 ecr 0,nop,wscale 7], length 0

A. The host with the IP address 93.184.216.34 is the source.
B. The host omar.cisco.com is the destination.
C. This is a Telnet transaction that is timing out and the server is not responding.
D. The server omar.cisco.com is responding to 93.184.216.34 with four data packets.

Answer: C

Question No : 10

Refer to the exhibit.

 
We have performed a malware detection on the Cisco website. Which statement about the
result is true?

A. The website has been marked benign on all 68 checks.
B. The threat detection needs to run again.
C. The website has 68 open threats.
D. The website has been marked benign on 0 checks.

Answer: A

Cisco 210-255 Exam 100% Passing Guarantee | 210-255 Study Tips Dumps4Download.us