Security News > 2020 > July > Finally done with all those Patch Tuesday updates? Think again! Here's 33 Cisco bug fixes, with five criticals

Cisco has emitted 33 security bug fixes in its latest crop of software updates, five of those deemed critical.
Affected devices include multiple RV-series routers, the RV110W series VPN Firewall, and the Cisco Prime License Manager.
On top of the five critical bugs, Cisco posted fixes for 11 CVE-listed vulnerabilities deemed to be high security risks.
Switchzilla's patches got buried beneath a flood of fixes from Microsoft, Adobe, VMware, SAP, and Google.
We will spare you the details on these hundreds of bug fixes, but needless to say they cover most of Oracle's main products, and include two flaws in SD-WAN Aware and Edge deemed to be 10.0 CVSS security risks.
News URL
https://go.theregister.com/feed/www.theregister.com/2020/07/16/cisco_patches_july/
Related news
- Patch now: Cisco fixes critical 9.9-rated, make-me-admin bug in Meeting Management (source)
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance (source)
- Week in review: Exploited Ivanti Connect Secure zero-day, Patch Tuesday forecast (source)
- Microsoft January 2025 Patch Tuesday fixes 8 zero-days, 159 flaws (source)
- Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks (source)
- Windows Patch Tuesday hits snag with Citrix software, workarounds published (source)
- Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9) (source)
- SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation (source)
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw (source)
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891) (source)