Networking equipment vendor Cisco Systems released multiple security updates on Wednesday to address vulnerabilities in its AnyConnect Secure Mobility Client, ASA 5500 Series Adaptive Security Appliances, Cisco Catalyst 6500 Series ASA Services Module and Cisco Application Control Engine (ACE) software. Networking equipment vendor Cisco Systems released multiple security updates on Wednesday to address vulnerabilities in its AnyConnect Secure Mobility Client, ASA 5500 Series Adaptive Security Appliances, Cisco Catalyst 6500 Series ASA Services Module and Cisco Application Control Engine (ACE) software.The newly released versions of Cisco AnyConnect Secure Mobility Client — Cisco’s VPN and remote access product for businesses — address four vulnerabilities located in the software’s Web-based downloader components.AnyConnect Secure Mobility Client updates can be distributed in several ways, one of which involves accessing a website that loads special ActiveX or Java-based downloader components. This is known as a WebLaunch-initiated deployment.“During a malicious attack, any website that hosted a copy of the vulnerable component could masquerade as a trustworthy site and attempt to convince the user to instantiate the vulnerable component,” Cisco explained in a security advisory published on Wednesday. Two of the vulnerabilities could allow an attacker to execute malicious code on a user’s system, while the other two could allow an attacker to downgrade the client to an older version.One of the code execution vulnerabilities only affects older 64-bit Linux versions of the software. The other three affect Windows, Mac OS X and Linux versions alike. The software updates for the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module address a vulnerability that could allow a remote, unauthenticated, attacker to force devices to reboot.In order to be vulnerable to such an attack, the affected devices would have to run in transparent firewall mode, have IPv6 enabled and be configured to log message ID 110003, Cisco said in its corresponding advisory.The Cisco Application Control Engine (ACE) security updates address a vulnerability that might cause an administrator to log into an unintended context (virtual instance), if an ACE appliance or module is running in multicontext mode and is configured with the same management IP address. Related content brandpost Sponsored by SAP When natural disasters strike Japan, Ōita University’s EDiSON is ready to act With the technology and assistance of SAP and Zynas Corporation, Ōita University built an emergency-response collaboration tool named EDiSON that helps the Japanese island of Kyushu detect and mitigate natural disasters. By Michael Kure, SAP Contributor Dec 07, 2023 5 mins Digital Transformation brandpost Sponsored by BMC BMC on BMC: How the company enables IT observability with BMC Helix and AIOps The goals: transform an ocean of data and ultimately provide a stellar user experience and maximum value. By Jeff Miller Dec 07, 2023 3 mins IT Leadership brandpost Sponsored by BMC The data deluge: The need for IT Operations observability and strategies for achieving it BMC Helix brings thousands of data points together to create a holistic view of the health of a service. By Jeff Miller Dec 07, 2023 4 mins IT Leadership how-to How to create an effective business continuity plan A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster, whether fire, flood, or cyberattack. Here’s how to create a plan that gives your business the best chance of surviving such an By Mary K. Pratt, Ed Tittel, Kim Lindros Dec 07, 2023 11 mins Small and Medium Business Small and Medium Business Small and Medium Business Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe