{"id":25596,"date":"2019-02-21T05:04:09","date_gmt":"2019-02-21T05:04:09","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/"},"modified":"2019-02-21T05:04:09","modified_gmt":"2019-02-21T05:04:09","slug":"check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/","title":{"rendered":"Check yo self before you HyperWreck yo self: Cisco fixes gimme-root holes in HyperFlex, plus more security bugs"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/04\/19\/network_scientists_shutterstock.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Cisco emitted on Wednesday a bunch of security updates that, your support contract willing, you should test and roll out to installations as soon as possible.<\/p>\n<p>There are 17 advisories in all, including revised versions of previously issues bulletins, with six marked as high in terms of severity and the rest medium. The worst of the lot grants root access to a local attacker, closely followed by another that allows any remote miscreant in without authorization.<\/p>\n<p>Here&#8217;s a summary of the high-severity security blunders:<\/p>\n<ul readability=\"13.773952816562\">\n<li readability=\"2.8918269230769\"><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190220-hyperflex-injection\"><strong>CVE-2018-15380:<\/strong><\/a> <strong>Cisco HyperFlex Software Command Injection Vulnerability<\/strong>\n<p>A logged-in rogue user can execute commands as the root superuser without authentication. &#8220;An attacker could exploit this vulnerability by connecting to the cluster service manager and injecting commands into the bound process,&#8221; says Cisco. &#8220;A successful exploit could allow the attacker to run commands on the affected host as the root user.&#8221;<\/p>\n<\/li>\n<li readability=\"3.8761061946903\"><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190220-chn-root-access\"><strong>CVE-2019-1664:<\/strong><\/a> <strong>Cisco HyperFlex Software Unauthenticated Root Access Vulnerability<\/strong>\n<p>A logged-in miscreant can gain root access to all nodes in a Cisco HyperFlex Software cluster without authentication. &#8220;An attacker could exploit this vulnerability by connecting to the hxterm service as a non-privileged, local user,&#8221; Switchzilla explained. &#8220;A successful exploit could allow the attacker to gain root access to all member nodes of the HyperFlex cluster.&#8221;<\/p>\n<\/li>\n<li readability=\"3.6024096385542\"><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190215-runc\"><strong>CVE-2019-5736:<\/strong><\/a> <strong>Container Privilege Escalation Vulnerability Affecting Cisco Products<\/strong>\n<p>This is a patch for Docker&#8217;s give-me-root runc hole, which we <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/02\/11\/docker_container_flaw\/\">previously reported<\/a>, that affects Cisco products. This is version 1.2 of an earlier advisory, with more Switchzilla gear now listed as being vulnerable to the privilege-escalation flaw.<\/p>\n<\/li>\n<li readability=\"1.8943396226415\"><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190220-prime-validation\"><strong>CVE-2019-1659:<\/strong><\/a> <strong>Cisco Prime Infrastructure Certificate Validation Vulnerability<\/strong>\n<p>An unauthenticated man-in-the-middle attacker can intercept, decrypt, and snoop on the SSL-encrypted tunnel between Cisco&#8217;s Identity Services Engine (ISE) and Cisco Prime Infrastructure.<\/p>\n<\/li>\n<li readability=\"0.95155709342561\"><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190220-pca-access\"><strong>CVE-2019-1662:<\/strong><\/a> <strong>Cisco Prime Collaboration Assurance Software Unauthenticated Access Vulnerability<\/strong>\n<p>An unauthenticated, remote attacker can access installations of Cisco&#8217;s Quality of Voice Reporting (QOVR) service of Switchzilla&#8217;s Prime Collaboration Assurance (PCA) Software as a valid user.<\/p>\n<\/li>\n<li readability=\"2.8679245283019\"><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190220-ncs\"><strong>CVE-2019-1681:<\/strong><\/a> <strong>Cisco Network Convergence System 1000 Series TFTP Directory Traversal Vulnerability<\/strong>\n<p>An unauthenticated, remote attacker can download arbitrary files from the TFTP service of Cisco Network Convergence System 1000 Series software, possibly resulting in the disclosure of potentially sensitive information.<\/p>\n<\/li>\n<\/ul>\n<p>The <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.cisco.com\/security\/center\/publicationListing.x\">remaining<\/a> medium-severity holes include a Webex Teams for iOS Arbitrary File Upload Vulnerability (<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190220-webx-ios-file\">CVE-2019-1689<\/a>), IoT Field Network Director XML External Entity Vulnerability (<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190220-iot-fnd-xml\">CVE-2019-1698<\/a>), Hyperflex Stored Cross-Site Scripting Vulnerability (<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190220-hyper-xss\">CVE-2019-1665<\/a>), and a Cisco Unity Connection Reflected Cross-Site Scripting Vulnerability (<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190220-cuc-rxss\">CVE-2019-168<\/a>).<\/p>\n<p>Interestingly enough, the Cisco Firepower 9000 Series with the Cisco Firepower 2-port 100G double-width network module can be crashed (<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190220-firpwr-dos\">CVE-2019-1700<\/a>) by sending it maliciously crafted network packets from an adjacent subnet. This causes its FPGA, a chip that can have its circuitry rewired pretty much as desired, to lose the plot, and stuff the machine sideways.<\/p>\n<p>&#8220;The vulnerability is due to a logic error in the FPGA related to the processing of different types of input packets,&#8221; says Switchzilla. &#8220;An attacker could exploit this vulnerability by being on the adjacent subnet and sending a crafted sequence of input packets to a specific interface on an affected device.&#8221;<\/p>\n<p>That must have been an interesting bug to find and fix, we reckon. It was found while diagnosing a customer support query, we&#8217;re told. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7143\/cloud-security-from-start-point-to-end-point?td=wptl1810\">Cloud Security: From Start Point to End Point<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/02\/21\/cisco_vulnerabilities\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Patches available now spread across more than a dozen advisories Cisco emitted on Wednesday a bunch of security updates that, your support contract willing, you should test and roll out to installations as soon as possible.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25597,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-25596","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Check yo self before you HyperWreck yo self: Cisco fixes gimme-root holes in HyperFlex, plus more security bugs 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Check yo self before you HyperWreck yo self: Cisco fixes gimme-root holes in HyperFlex, plus more security bugs 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-21T05:04:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"429\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Check yo self before you HyperWreck yo self: Cisco fixes gimme-root holes in HyperFlex, plus more security bugs\",\"datePublished\":\"2019-02-21T05:04:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\\\/\"},\"wordCount\":572,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\\\/\",\"name\":\"Check yo self before you HyperWreck yo self: Cisco fixes gimme-root holes in HyperFlex, plus more security bugs 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs.jpg\",\"datePublished\":\"2019-02-21T05:04:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs.jpg\",\"width\":648,\"height\":429},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Check yo self before you HyperWreck yo self: Cisco fixes gimme-root holes in HyperFlex, plus more security bugs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Check yo self before you HyperWreck yo self: Cisco fixes gimme-root holes in HyperFlex, plus more security bugs 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/","og_locale":"en_US","og_type":"article","og_title":"Check yo self before you HyperWreck yo self: Cisco fixes gimme-root holes in HyperFlex, plus more security bugs 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-21T05:04:09+00:00","og_image":[{"width":648,"height":429,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Check yo self before you HyperWreck yo self: Cisco fixes gimme-root holes in HyperFlex, plus more security bugs","datePublished":"2019-02-21T05:04:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/"},"wordCount":572,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/","url":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/","name":"Check yo self before you HyperWreck yo self: Cisco fixes gimme-root holes in HyperFlex, plus more security bugs 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs.jpg","datePublished":"2019-02-21T05:04:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs.jpg","width":648,"height":429},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/check-yo-self-before-you-hyperwreck-yo-self-cisco-fixes-gimme-root-holes-in-hyperflex-plus-more-security-bugs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Check yo self before you HyperWreck yo self: Cisco fixes gimme-root holes in HyperFlex, plus more security bugs"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25596"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25596\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25597"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}