Subscribe

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Service

Atlassian and Cisco Fix Critical Security Bugs

Atlassian and Cisco Fix Critical Security Bugs Atlassian and Cisco Fix Critical Security Bugs
IMAGE CREDITS: CISCO NEWSROOM

Atlassian and Cisco have issued critical patches to fix several high-severity vulnerabilities across key products, some of which could lead to remote code execution (RCE) if left unaddressed.

Atlassian rolled out seven security updates this week targeting long-standing issues in its Bamboo, Confluence, and Jira platforms. Among the flaws addressed were four serious vulnerabilities in third-party libraries—some dating back nearly six years. The company emphasized that, although these bugs were public, there’s no evidence they’ve been exploited in the wild.

One of the most urgent fixes tackled a denial-of-service (DoS) vulnerability in the Netplex Json-smart library, identified as CVE-2024-57699. This flaw affected multiple Atlassian products, including Bamboo Data Center and Server, Jira Data Center and Server, and Jira Service Management. Exploiting this issue doesn’t require authentication, making it a prime target for potential attackers.

Additional patches addressed an XML External Entity (XXE) injection vulnerability in Jira and Jira Service Management (CVE-2021-33813), which could also trigger a DoS condition.

Meanwhile, Atlassian’s Confluence platform was updated to fix two major bugs. One, tracked as CVE-2025-24970, was a DoS vulnerability in the Netty framework. The other, CVE-2019-10172, stemmed from the libjackson-json-java library and involved another XXE issue. Both flaws posed risks for data exposure and service disruption.

On the same day, Cisco released patches for three separate security flaws found in Webex App, Secure Network Analytics, and Nexus Dashboard.

The Webex App vulnerability, labeled CVE-2025-20236, carries high severity. If exploited, it could allow remote code execution by tricking users into clicking a malicious meeting invitation link that downloads unsafe files. The exploit hinges on social engineering but could be damaging if successful.

Cisco also patched a medium-severity bug in Secure Network Analytics (versions 7.5.0 through 7.5.2). This flaw could let authenticated users gain shell access with root privileges—effectively giving them full control over affected systems.

Finally, a separate issue in Nexus Dashboard allowed unauthenticated attackers to verify the existence of valid LDAP usernames remotely. While not as severe, this vulnerability could be used in reconnaissance stages of a cyberattack.

Cisco stated that it has no indication any of these flaws have been exploited in the wild. Full details of each fix are available on Cisco’s security advisories portal.

Share with others