Guest

Preview Tool

Cisco Bug: CSCvu76346 - DEV OPS: CIAM: Multiple vulnerabilities in ELK-7.8.0 version

Last Modified

Sep 22, 2020

Products (1)

  • Cisco Kinetic for Cities

Known Affected Releases

4.2.0.0

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2015-3717 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3717
CVE-2017-15806 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15806
CVE-2017-18640 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18640
CVE-2017-6888 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6888
CVE-2018-10237 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10237
CVE-2018-1313 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1313
CVE-2018-19664 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19664
CVE-2018-20330 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20330
CVE-2019-0190 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0190
CVE-2019-16168 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168
CVE-2019-16869 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16869
CVE-2019-19645 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
CVE-2019-19646 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19646
CVE-2019-20330 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20330
CVE-2019-20444 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20444
CVE-2019-20445 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20445
CVE-2020-10672 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10672
CVE-2020-10673 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10673
CVE-2020-10968 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10968
CVE-2020-10969 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969
CVE-2020-11111 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11111
CVE-2020-11112 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112
CVE-2020-11113 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113
CVE-2020-11612 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11612
CVE-2020-11619 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619
CVE-2020-11620 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11620
CVE-2020-11655 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655
CVE-2020-11656 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656
CVE-2020-13434 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434
CVE-2020-13435 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435
CVE-2020-13630 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630
CVE-2020-13631 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
CVE-2020-13632 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632
CVE-2020-14060 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060
CVE-2020-14061 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061
CVE-2020-14062 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14062
CVE-2020-14151 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14151
CVE-2020-14152 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14152
CVE-2020-14153 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14153
CVE-2020-14195 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14195
CVE-2020-1967 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967
CVE-2020-8840 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8840
CVE-2020-9488 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9488
CVE-2020-9546 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546
CVE-2020-9547 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547
CVE-2020-9548 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548

These bugs were opened proactively to investigate potential security impact(s) on the product. At this time, the product is not confirmed to be affected by any of the CVE(s).

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.