描述:
Cisco 发布了安全公告,以应对 Cisco 装置及软件中的多个漏洞。有关漏洞及攻击向量的资料,请参阅供应商网站的相应安全公告。
有报告指针对 Cisco Small Business Series Switches 的远端执行程式码漏洞 (CVE-2023-20159、CVE-2023-20160、CVE-2023-20161 及 CVE-2023-20189) 的概念验证 (PoC) 程式码已被公开。系统管理员应立即为受影响的系统安装修补程式,以减低受到网络攻击的风险。
受影响的系统:
- Cisco Business Wireless Access Points
- Cisco DNA Center Software
- Cisco Identity Services Engine
- Cisco Small Business Series Switches
- Cisco Smart Software Manager On-Prem
有关受影响产品的详细资料,请参阅供应商网站的相应安全公告中有关 “Affected Products” 的部分。
Cisco Small Business 200 Series Smart Switches、300 Series Managed Switches 及 500 Series Stackable Managed Switches 已结束,再不会获提供安全更新。用户应安排升级产品至受支持的版本,或转至其他受支持的技术。
影响:
成功利用漏洞可以在受影响的系统导致远端执行程式码、插入任意指令码、服务被拒绝、泄漏资讯、绕过保安限制或篡改,视乎攻击者利用哪些漏洞而定。
建议:
适用于受影响系统的软件更新已可获取。受影响系统的系统管理员应遵从产品供应商的建议,立即採取行动以降低风险。有关修补程式的详细资料,请参阅供应商网站的相应安全公告中有关 “Fixed Software”的部分。
系统管理员可联络其产品支援供应商,以取得修补程式及有关支援。
进一步资讯:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-auth-bypass-ggnAfdZ
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-multiple-kTQkGU3
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-delete-read-PK5ghDDd
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-dwnld-Srcdnkd2
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-sRQnsEU9
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-traversal-ZTUgMYhu
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-696OZTCm
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssm-sql-X9MmjSYh
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20230518
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20003
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20077
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20110
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20156 (to CVE-2023-20164)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20166 (to CVE-2023-20167)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20171 (to CVE-2023-20174)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20182 (to CVE-2023-20184)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20189