Cisco has issued a Security Alert warning of three vulnerabilities in its IronPort line. The flaws affect versions 6.2 and 6.5 of the IronPort Encryption appliance, as well as IronPort PostX MAP.
The company said that the IronPort C, M and S appliances are not believed to be vulnerable.
Cisco reported that two of the flaws, if exploited, could allow an attacker to view sensitive system administration details, while the third could allow remote code execution.
The first of the information disclosure flaws is in the appliance's administration interface component, and the second is in the WebSafe Servlet component.
The remote code execution vulnerability affects the HTTPS server component. This can be mitigated by restricting access to trusted IP addresses, the company said.
Administrators looking to obtain and install the fixes are advised to contact Cisco's IronPort technical support team.
IBM and Technical University of Munich team demonstrate how Shor's algorithm, which can't be cracked by conventional computers, can be solved quickly with quantum computing
Hubble Space Telescope finds superflares from young red dwarfs could strip away planetary atmosphere
Younger stars are 100 to 1,000 times more energetic than when they're older
Two of the big four supermarkets will use the system to control sales of restricted products
PUBG news and updates: November's Update #23 to bring new Skorpion pistol and changes to blue zone visibility
Genuinely useful side-arm coming to PUBG in Update #23