The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Cisco Meraki MX***

Snort: data transit via TFO Policy Bypass
An attacker can bypass filtering rules via TFO Policy Bypass of Snort, in order to transmit malicious data...
cisco-sa-snort-tfo-bypass-MmzZrtes, CSCvt43136, CSCvu88532, CVE-2021-1224, VIGILANCE-VUL-34314
Snort: data transit via HTTP Detection Bypass
An attacker can bypass filtering rules via HTTP Detection Bypass of Snort, in order to transmit malicious data...
CERTFR-2020-AVI-671, cisco-sa-ftd-bypass-3eCfd24j, CSCvm69545, CSCvq96573, CVE-2020-3299, VIGILANCE-VUL-33661
Cisco Meraki: privilege escalation via Local Status Page
An attacker can bypass restrictions via Local Status Page of Cisco Meraki, in order to escalate his privileges...
CERTFR-2018-AVI-536, cisco-sa-20181107-meraki, CVE-2018-0284, VIGILANCE-VUL-27719
Our database contains other pages. You can request a free trial to read them.

Display information about Cisco Meraki MX***: