描述:
Cisco 发布了安全公告,以应对 Cisco 装置及软件的多个漏洞。有关漏洞及攻击向量的资料,请参阅供应商网站的相应安全公告。
有报告指 Cisco Adaptive Security Appliance 及 Firepower Threat Defense Software 服务被拒绝漏洞 (CVE-2024-20481) 正受到攻击。Cisco 发布了安全性更新,以应对以上问题。系统管理员应立即为受影响的系统安装修补程式,以减低受到网络攻击的风险。
受影响的系统:
- Cisco Adaptive Security Appliance Software
- Cisco Adaptive Security Virtual Appliance
- Cisco Firepower Threat Defense Software
- Cisco Secure Client Software
- Cisco Secure Firewall Management Center Software
- Cisco Secure Firewall Threat Defense Virtual
- Snort 2、Snort 3
- Cisco Adaptive Security Appliance Software with Remote Access VPN (RAVPN) service enabled
- Cisco Firepower Threat Defense Software with Remote Access VPN (RAVPN) service enabled
有关受影响系统的详细资料,请参阅供应商网站的相应安全公告中有关 “Affected Products” 的部分。
影响:
成功利用漏洞可以在受影响的系统导致远端执行程式码、服务被拒绝、权限提升、泄漏资讯、绕过保安限制、仿冒诈骗或篡改,视乎攻击者利用哪些漏洞而定。
建议:
适用于受影响系统的修补程式已可获取。 受影响系统的系统管理员应遵从供应商的建议,立即採取行动以降低风险。有关修补程式的详细资料,请参阅供应商网站的相应安全公告中有关 “Fixed Software”的部分。
系统管理员可联络其供应商,以取得修补程式及有关支援。
进一步资讯:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-priv-esc-hBS9gnwq
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssh-dos-eEDWu5RM
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssh-rce-gRAuPEUF
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-tls-CWY6zXB
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-4gYEWMKg
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-cZf8gT
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-nyH3fhp
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-acl-bypass-VvnLNKqf
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-bf-dos-vDZhLqrW
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dap-dos-bhEkP7n
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-9FgEyHsF
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nsgacl-bypass-77XnEAsL
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-lce-vU3ekMJ3
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-snmp-dos-7TcnzxTU
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-dos-hOnB9pH4
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-yjj7ZjVq
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftdvirtual-dos-MuenGnYR
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csc-dos-XvPhM3bj
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-2HBkA97G
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-g8AOKnDP
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-v3AWDqN7
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-read-5q4mQRn
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-nfJeYHxz
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-priv-esc-CMQ4S6m7
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inject-2EnmTC8v
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fmc-code-inj-wSHrgz8L
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-geoip-bypass-MB4zRDu
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-statcred-dFC8tXT5
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-dos-QXYE5Ufy
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd2100-snort-dos-M9HuMt75
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sa-ftd-snort-fw-BCJTZPMu
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-bypass-PTry37fX
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-rf-bypass-OY8f3pnM
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20063
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20260
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20264
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20268 (to CVE-2024-20269)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20273 (to CVE-2024-20275)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20297 (to CVE-2024-20300)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20329 (to CVE-2024-20331)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20339 (to CVE-2024-20342)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20351
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20364
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20370
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20372
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20374
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20377
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20379
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20382
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20384
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20386 (to CVE-2024-20388)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20402 (to CVE-2024-20403)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20407 (to CVE-2024-20410)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20412
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20415
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20424
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20426
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20431
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20471 (to CVE-2024-20474)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20481 (to CVE-2024-20482)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20485
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20493 (to CVE-2024-20495)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20526
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20241025