433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Agencies brace for a potential government shutdown

Agencies are supposed to release contingency plans, detailing which employees would keep working and who would be furloughed. The post Agencies brace for a potential government shutdown first appeared on Federal News Network.
http://news.poseidon-us.com/TNGjJv

2 detainees killed and another critically injured in Dallas ICE facility, Homeland Security says

Authorities say no ICE agents were injured and the detainee who survived is in critical condition. The post 2 detainees killed and another critically injured in Dallas ICE facility, Homeland Security says first appeared on Federal News Network.
http://news.poseidon-us.com/TNGhWy

The Federal Register is flashing warning signs

“I want to think this is a reworking behind the scenes of the Federal Register database, but there’s been no response on why it’s changed,” Wayne Crews said. The post The Federal Register is flashing warning signs first appeared on Federal News Network.
http://news.poseidon-us.com/TNGhTx

The Federal Register is flashing warning signs

“I want to think this is a reworking behind the scenes of the Federal Register database, but there’s been no response on why it’s changed,” Wayne Crews said. The post The Federal Register is flashing warning signs first appeared on Federal News Network.
http://news.poseidon-us.com/TNGg3Q

Uncover Your Vendor’s Hidden Infrastructure Before it Becomes a Problem

Uncover unseen third-party risks. Get full visibility into vendors’ IPs, domains, subsidiaries, and facilities to make faster, data-driven security decisions.
http://news.poseidon-us.com/TNGbyD

Aviation meteorologists help keep flights safe, but there aren’t enough of them

“The national airspace system is already under strain with air traffic controller shortages and periodic equipment failures,” said Derrick Collins. The post Aviation meteorologists help keep flights safe, but there aren’t enough of them first appeared on Federal News Network.
http://news.poseidon-us.com/TNGZ5p

Aviation meteorologists help keep flights safe, but there aren’t enough of them

“The national airspace system is already under strain with air traffic controller shortages and periodic equipment failures,” said Derrick Collins. The post Aviation meteorologists help keep flights safe, but there aren’t enough of them first appeared on Federal News Network.
http://news.poseidon-us.com/TNGYr4

Cisco IOS XE Software Secure Boot Bypass Vulnerabilities

Multiple vulnerabilities in Cisco IOS XE Software could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to an affected device to execute persistent code at boot time and break the chain of trust. These vulnerabilities are due improper validation of software packages. An attacker could exploit these vulnerabilities by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute persistent code on the underlying operating system. Because these vulnerabilities allow an attacker to bypass a major security feature of a device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secboot-UqFD8AvC This advisory is part of the September 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20313,CVE-2025-20314
http://news.poseidon-us.com/TNGXcs

Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability

A vulnerability in the implementation of the TACACS+ protocol in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to view sensitive data or bypass authentication.  This vulnerability exists because the system does not properly check whether the required TACACS+ shared secret is configured. A machine-in-the-middle attacker could exploit this vulnerability by intercepting and reading unencrypted TACACS+ messages or impersonating the TACACS+ server and falsely accepting arbitrary authentication requests. A successful exploit could allow the attacker to view sensitive information in a TACACS+ message or bypass authentication and gain access to the affected device.   Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-tacacs-hdB7thJw This advisory is part of the September 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20160
http://news.poseidon-us.com/TNGXcm

Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability

A vulnerability in the web UI of Cisco IOS Software could allow an authenticated, remote attacker with low privileges to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation. An attacker could exploit this vulnerability by sending a crafted URL in an HTTP request. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. There is a mitigation that addresses this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-invalid-url-dos-Nvxszf6u This advisory is part of the September 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20327
http://news.poseidon-us.com/TNGXbm