433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Catching CARP: Fishing for Firewall States in PFSync Traffic, (Wed, Jan 22nd)

Legend has it that in the Middle Ages, monchs raised carp to be as “round” as possible. The reason was that during Lent, one could only eat as much as fit on a plate, and the round shape of a carp gave them the most “fish per plate”. But we are not here to exchange recipes. I want to talk about CARP and the network failover feature.
http://news.poseidon-us.com/THWTfq

DoD moves to improve maritime security in contested Southeast Asia

A new industry and government consortium has joined the federal scene. This one is devoted to maritime security in Southeast Asia, or MARSEC. The post DoD moves to improve maritime security in contested Southeast Asia first appeared on Federal News Network.
http://news.poseidon-us.com/THWRcn

DoD moves to improve maritime security in contested Southeast Asia

A new industry and government consortium has joined the federal scene. This one is devoted to maritime security in Southeast Asia, or MARSEC. The post DoD moves to improve maritime security in contested Southeast Asia first appeared on Federal News Network.
http://news.poseidon-us.com/THWRP9

For the new Congress, an AI proposal from the last Congress

Members of the bipartisan House Task Force on AI want to ensure U.S. leadership while mitigating the threats to privacy and safety. The post For the new Congress, an AI proposal from the last Congress first appeared on Federal News Network.
http://news.poseidon-us.com/THWMKF

For the new Congress, an AI proposal from the last Congress

Members of the bipartisan House Task Force on AI want to ensure U.S. leadership while mitigating the threats to privacy and safety. The post For the new Congress, an AI proposal from the last Congress first appeared on Federal News Network.
http://news.poseidon-us.com/THWM1m

Cisco BroadWorks SIP Denial of Service Vulnerability

A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition. This vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover. For more information about this vulnerability, see the Details section of this advisory. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt Security Impact Rating: High CVE: CVE-2025-20165
http://news.poseidon-us.com/THWHk0

Cisco Meeting Management REST API Privilege Escalation Vulnerability

A vulnerability in the REST API of Cisco Meeting Management could allow a remote, authenticated attacker with low privileges to elevate privileges to administrator on an affected device. This vulnerability exists because proper authorization is not enforced upon REST API users. An attacker could exploit this vulnerability by sending API requests to a specific endpoint. A successful exploit could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-privesc-uy2Vf8pc Security Impact Rating: Critical CVE: CVE-2025-20156
http://news.poseidon-us.com/THWHjj

ClamAV OLE2 File Format Decryption Denial of Service Vulnerability

A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the ClamAV blog. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA Security Impact Rating: Medium CVE: CVE-2025-20128
http://news.poseidon-us.com/THWHgh