{"id":11908,"date":"2018-09-06T13:13:53","date_gmt":"2018-09-06T13:13:53","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29292\/Cisco-Warns-Customers-Of-Critical-Flaws-Including-Struts.html"},"modified":"2018-09-06T13:13:53","modified_gmt":"2018-09-06T13:13:53","slug":"cisco-warns-customers-of-critical-flaws-including-struts","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/","title":{"rendered":"Cisco Warns Customers Of Critical Flaws, Including Struts"},"content":{"rendered":"<p>Cisco has issued a security advisory to customers detailing a swathe of critical and highly-rated vulnerabilities which have been resolved.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>The <a href=\"https:\/\/tools.cisco.com\/security\/center\/publicationListing.x\" target=\"_blank\" rel=\"noopener noreferrer\">security advisory<\/a> documents three critical vulnerabilities, 19 bugs rated &#8220;important,&#8221; and a number of medium-severity security flaws.<\/p>\n<p>One of the most serious bugs is a vulnerability impacting Apache Struts 2, which was <a href=\"https:\/\/www.zdnet.com\/article\/critical-remote-code-execution-flaw-in-apache-struts-exposes-the-enterprise-to-attack\/\">publicly disclosed in August<\/a> together with proof-of-concept (PoC) code.<\/p>\n<p>If exploited, the security flaw, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-11776\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-11776<\/a> , permits attackers to remotely execute code due to insufficient validation of user input. According to Cisco, only one patch for one product has been issued so far to protect against the Apache bug.<\/p>\n<p>Other products will receive fixes over the course of this month.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2018\/09\/06\/2d968629-69cd-4777-a179-4fa81933ce06\/resize\/770xauto\/ea7adc88d9bed57c5de43d86e3dd8f1e\/screen-shot-2018-09-06-at-09-38-57.png\" class=\"\" alt=\"screen-shot-2018-09-06-at-09-38-57.png\" height=\"auto\" width=\"770\"\/><\/span> <\/p>\n<p>&#8220;Vulnerable products marked with an asterisk contain an affected Struts library, but due to how the library is used within the product, these products are not vulnerable to any of the exploitation vectors known to Cisco at the time of publication,&#8221; the company added.<\/p>\n<p><strong>See also: <a href=\"https:\/\/www.zdnet.com\/article\/apache-2-vulnerability-exploited-in-linux-cryptojacking-campaign\/\">Cryptojacking campaign exploiting Apache Struts 2 flaw kills off the competition<\/a><\/strong><\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Another critical security flaw which has been tackled in this update is <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2018-0423\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-0423<\/a>, a vulnerability present in the web-based management interface of the Cisco RV110W Wireless-N VPN firewall, Cisco RV130W Wireless-N Multifunction VPN router, and Cisco RV215W Wireless-N VPN router.<\/p>\n<p>The bug has been caused by improper boundary restrictions on user-supplied input in the &#8220;Guest&#8221; user feature. By sending crafted, malicious code, threat actors can trigger a buffer overflow condition.<\/p>\n<p><strong>See also: <a href=\"https:\/\/www.zdnet.com\/article\/this-malware-disguises-itself-as-bank-security-to-raid-your-account\/\">This malware disguises itself as bank security to raid your account<\/a><\/strong><\/p>\n<p>If exploited, attackers cause a denial-of-service (DoS) condition without the need for authentication, as well as execute arbitrary code.<\/p>\n<p>The final critical vulnerability is <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-0435\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-0435<\/a>, which impacts the cloud security platform Cisco Umbrella.<\/p>\n<p>Due to insufficient authentication configurations in the platform&#8217;s API, authenticated, remote attackers are able to view and modify data across a corporate network &#8212; as well as other organizations.<\/p>\n<p><strong>TechRepublic: <a href=\"https:\/\/www.techrepublic.com\/article\/timehop-breach-illustrates-need-for-multi-factor-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\">Timehop breach illustrates need for multi-factor authentication<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.criticalstart.com\/2018\/09\/cisco-umbrella-enterprise-roaming-client-and-enterprise-roaming-module-privilege-escalation-vulnerability\/\" target=\"_blank\" rel=\"noopener noreferrer\">Critical Start&#8217;s Section 8<\/a> cybersecurity team reported <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180905-umbrella-priv\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-0437<\/a> and <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180905-umbrella-file-read\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-0438<\/a>, two privilege escalation flaws in the enterprise platform.<\/p>\n<p>The tech giant also resolved a range of vulnerabilities impacting the Webex Meetings Client, the SD-WAN solution certifications platform, the Data Center network manager and Tetration, among others.<\/p>\n<p>The security flaws included Windows-based privilege escalation bugs, information leaks, command injection flaws, and cross-site scripting (XSS) vulnerabilities.<\/p>\n<p><strong>CNET: <a href=\"https:\/\/www.cnet.com\/news\/huawei-zte-get-called-out-during-senate-hearing-on-facebook-twitter\/\" target=\"_blank\" rel=\"noopener noreferrer\">Huawei, ZTE get called out during Senate hearing on Facebook, Twitter<\/a><\/strong><\/p>\n<p>In March, Cisco <a href=\"https:\/\/www.zdnet.com\/article\/cisco-critical-flaw-at-least-8-5-million-switches-open-to-attack-so-patch-now\/\">patched a critical flaw<\/a> in switch deployment software which exposed at least 8.5 million switches to exploit.<\/p>\n<p>The vulnerability, <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180328-smi2\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-0171<\/a>, affected the Smart Install Cisco client and enabled remote attackers to execute arbitrary code.<\/p>\n<h3>Previous and related coverage<\/h3>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29292\/Cisco-Warns-Customers-Of-Critical-Flaws-Including-Struts.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":11909,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[2170],"class_list":["post-11908","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineflawpatchcisco"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cisco Warns Customers Of Critical Flaws, Including Struts 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco Warns Customers Of Critical Flaws, Including Struts 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-06T13:13:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/cisco-warns-customers-of-critical-flaws-including-struts.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"738\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-warns-customers-of-critical-flaws-including-struts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-warns-customers-of-critical-flaws-including-struts\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cisco Warns Customers Of Critical Flaws, Including Struts\",\"datePublished\":\"2018-09-06T13:13:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-warns-customers-of-critical-flaws-including-struts\\\/\"},\"wordCount\":459,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-warns-customers-of-critical-flaws-including-struts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/cisco-warns-customers-of-critical-flaws-including-struts.png\",\"keywords\":[\"headline,flaw,patch,cisco\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-warns-customers-of-critical-flaws-including-struts\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-warns-customers-of-critical-flaws-including-struts\\\/\",\"name\":\"Cisco Warns Customers Of Critical Flaws, Including Struts 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-warns-customers-of-critical-flaws-including-struts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-warns-customers-of-critical-flaws-including-struts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/cisco-warns-customers-of-critical-flaws-including-struts.png\",\"datePublished\":\"2018-09-06T13:13:53+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-warns-customers-of-critical-flaws-including-struts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-warns-customers-of-critical-flaws-including-struts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-warns-customers-of-critical-flaws-including-struts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/cisco-warns-customers-of-critical-flaws-including-struts.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/cisco-warns-customers-of-critical-flaws-including-struts.png\",\"width\":770,\"height\":738},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-warns-customers-of-critical-flaws-including-struts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,flaw,patch,cisco\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineflawpatchcisco\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cisco Warns Customers Of Critical Flaws, Including Struts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cisco Warns Customers Of Critical Flaws, Including Struts 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/","og_locale":"en_US","og_type":"article","og_title":"Cisco Warns Customers Of Critical Flaws, Including Struts 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-09-06T13:13:53+00:00","og_image":[{"width":770,"height":738,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/cisco-warns-customers-of-critical-flaws-including-struts.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cisco Warns Customers Of Critical Flaws, Including Struts","datePublished":"2018-09-06T13:13:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/"},"wordCount":459,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/cisco-warns-customers-of-critical-flaws-including-struts.png","keywords":["headline,flaw,patch,cisco"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/","url":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/","name":"Cisco Warns Customers Of Critical Flaws, Including Struts 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/cisco-warns-customers-of-critical-flaws-including-struts.png","datePublished":"2018-09-06T13:13:53+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/cisco-warns-customers-of-critical-flaws-including-struts.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/cisco-warns-customers-of-critical-flaws-including-struts.png","width":770,"height":738},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cisco-warns-customers-of-critical-flaws-including-struts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,flaw,patch,cisco","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineflawpatchcisco\/"},{"@type":"ListItem","position":3,"name":"Cisco Warns Customers Of Critical Flaws, Including Struts"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/11908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=11908"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/11908\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/11909"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=11908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=11908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=11908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}