diff --git a/docs/advisories/20240906003-Cisco-Publishes-Critical-Update.md b/docs/advisories/20240906003-Cisco-Publishes-Critical-Update.md index a03d73c1..436ba19b 100644 --- a/docs/advisories/20240906003-Cisco-Publishes-Critical-Update.md +++ b/docs/advisories/20240906003-Cisco-Publishes-Critical-Update.md @@ -8,8 +8,7 @@ The WA SOC has been made aware of multiple vulnerabilities in Cisco Smart Licens | Product(s) Affected | Version(s) | CVE | CVSS | Severity | | ----------------------------- | --------------------- | ----------------------------------------------------------------- | ---- | ------------ | -| Cisco Smart Licensing Utility | versions before 2.3.0 | [CVE-2024-20439](https://nvd.nist.gov/vuln/detail/CVE-2024-20439) | 9.8 | **Critical** | -| Cisco Smart Licensing Utility | versions before 2.3.0 | [CVE-2024-20440](https://nvd.nist.gov/vuln/detail/CVE-2024-20440) | 7.5 | High | +| Cisco Smart Licensing Utility | versions before 2.3.0 | [CVE-2024-20439](https://nvd.nist.gov/vuln/detail/CVE-2024-20439)
[CVE-2024-20440](https://nvd.nist.gov/vuln/detail/CVE-2024-20440) | **Critical**
High | 9.8
7.5 | **Critical**
High | ## What has been observed? @@ -19,9 +18,9 @@ There is no evidence of exploitation affecting Western Australian Government net The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)): -- [Cisco Smart Licensing Utility Vulnerabilities](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw) +- Cisco article: ## Additional References -- [Tenable - CVE-2024-20439](https://www.tenable.com/cve/CVE-2024-20439) -- [Tenable - CVE-2024-20440](https://www.tenable.com/cve/CVE-2024-20440) +- Tenable - CVE-2024-20439: +- Tenable - CVE-2024-20440: