433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Cisco Identity Services Engine RADIUS Denial of Service Vulnerability

A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain RADIUS requests. An attacker could exploit this vulnerability by sending a specific authentication request to a network access device (NAD) that uses Cisco ISE for authentication, authorization, and accounting (AAA). A successful exploit could allow the attacker to cause Cisco ISE to reload. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-restart-ss-uf986G2Q Security Impact Rating: High CVE: CVE-2025-20152
http://news.poseidon-us.com/TKvdvH

Cisco Duo Self-Service Portal Command Injection Vulnerability

A vulnerability in the self-service portal of Cisco Duo could allow an unauthenticated, remote attacker to inject arbitrary commands into emails that are sent by the service. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands into a portion of an email that is sent by the service. A successful exploit could allow the attacker to send emails that contain malicious content to unsuspecting users. Cisco Duo has addressed this vulnerability in the service, and no customer action is necessary to update on-premises software or devices. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-ssp-cmd-inj-RCmYrNA Security Impact Rating: Medium CVE: CVE-2025-20258
http://news.poseidon-us.com/TKvdtz

Cisco Unified Intelligence Center Privilege Escalation Vulnerabilities

Multiple vulnerabilities in Cisco Unified Intelligence Center could allow an authenticated, remote attacker to perform privilege escalation attacks on an affected system. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-priv-esc-3Pk96SU4 Security Impact Rating: High CVE: CVE-2025-20113,CVE-2025-20114
http://news.poseidon-us.com/TKvdtM

Cisco Unified Communications Products Privilege Escalation Vulnerability

A vulnerability in multiple Cisco Unified Communications and Contact Center Solutions products could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability is due to excessive permissions that have been assigned to system commands. An attacker could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to escape the restricted shell and gain root privileges on the underlying operating system of an affected device. To successfully exploit this vulnerability, an attacker would need administrative access to the ESXi hypervisor. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-kkhZbHR5 Security Impact Rating: Medium CVE: CVE-2025-20112
http://news.poseidon-us.com/TKvdrW

Data-stealing VS Code extensions removed from official Marketplace

Developers who specialize in writing smart (primarily Ethereum) contracts using the Solidity programming language have been targeted via malicious VS Code extensions that install malware that steals cryptocurrency wallet credentials. “Based on shared infrastructure and obfuscation characteristics, we attribute all three extensions to a single threat actor, which we track as MUT-9332, that was also behind a recently reported campaign to distribute a Monero cryptominer via backdoored VS Code extensions,” Datadog security researchers have shared. … More → The post Data-stealing VS Code extensions removed from official Marketplace appeared first on Help Net Security.
http://news.poseidon-us.com/TKvZk6

Gerry Connolly, longtime federal workforce and IT advocate, dead at 75

Rep. Gerry Connolly (D-Va.), an outspoken supporter of federal employees, died Wednesday at 75, after being diagnosed with esophageal cancer late last year. The post Gerry Connolly, longtime federal workforce and IT advocate, dead at 75 first appeared on Federal News Network.
http://news.poseidon-us.com/TKvXLY

Gerry Connolly, longtime federal workforce and IT advocate, dead at 75

Rep. Gerry Connolly (D-Va.), an outspoken supporter of federal employees, died Wednesday at 75, after being diagnosed with esophageal cancer late last year. The post Gerry Connolly, longtime federal workforce and IT advocate, dead at 75 first appeared on Federal News Network.
http://news.poseidon-us.com/TKvXKx

Anchore SBOM tracks software supply chain issues

Anchore announced the next phase of its SBOM strategy with the release of Anchore SBOM. With the addition of Anchore SBOM, Anchore Enterprise now provides a centralized platform for viewing, managing and analyzing Software Bill of Materials (SBOMs), including the capability of “Bringing Your Own SBOMs”. Organizations can now gain comprehensive visibility into the software components present in both their internally developed and third-party supplied software to identify and mitigate security and compliance risks. Driven … More → The post Anchore SBOM tracks software supply chain issues appeared first on Help Net Security.
http://news.poseidon-us.com/TKvSpX

DoD orders ‘immediate’ changes to troubled PCS moving program, replaces senior official

In a memo, Defense Secretary Pete Hegseth ordered the department to address “deficiencies” in the multibillion dollar Global Household Goods Contract (GHC). The post DoD orders ‘immediate’ changes to troubled PCS moving program, replaces senior official first appeared on Federal News Network.
http://news.poseidon-us.com/TKvRQR

DoD orders ‘immediate’ changes to troubled PCS moving program, replaces senior official

In a memo, Defense Secretary Pete Hegseth ordered the department to address “deficiencies” in the multibillion dollar Global Household Goods Contract (GHC). The post DoD orders ‘immediate’ changes to troubled PCS moving program, replaces senior official first appeared on Federal News Network.
http://news.poseidon-us.com/TKvPJ1