描述:
Cisco 发布了安全公告,以应对 Cisco 装置及软件的多个漏洞。有关漏洞及攻击向量的资料,请参阅供应商网站的相应安全公告。
有报告指影响 Cisco Secure Email Gateway 及 Cisco Smart Software Manager On-Prem 的多个漏洞 (CVE-2024-20401 及 CVE-2024-20419) 正处于被攻击的高风险。系统管理员应立即为受影响的系统安装修补程式,以减低受到网络攻击的风险。
受影响的系统:
- Cisco Secure Email Gateway
- Cisco Smart Software Manager On-Prem
- Cisco Expressway Series
- Cisco Identity Services Engine
- Cisco Intelligent Node Software
- Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers
- Cisco Secure Web Appliance
- Cisco Webex App
有关受影响系统的详细资料,请参阅供应商网站的相应安全公告中有关 “Affected Products” 的部分。
影响:
成功利用漏洞可以在受影响的系统导致远端执行程式码、服务被拒绝、泄漏资讯、权限提升或篡改,视乎攻击者利用哪些漏洞而定。
建议:
适用于受影响系统的修补程式已可获取。受影响系统的系统管理员应遵从供应商的建议,立即採取行动以降低风险。有关修补程式的详细资料,请参阅供应商网站的相应安全公告中有关 “Fixed Software”的部分。
系统管理员可联络其供应商,以取得修补程式及有关支援。
进一步资讯:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-auth-sLw3uhUy
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgj
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-inode-static-key-VUVCeynn
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-krW2TxA9
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv34x-rce-7pqFU2e
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20240718
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20296
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20323
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20395 (to CVE-2024-20396)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20400 (to CVE-2024-20401)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20416
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20419
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20429
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20435