描述:
Cisco 发布了安全公告,以应对 Cisco 装置及软件的多个漏洞。有关漏洞及攻击向量的资料,请参阅供应商网站的相应安全公告。
受影响的系统:
- Cisco 6800、7800、8800、9800 Series Phones
- Cisco Enterprise Chat and Email
- Cisco Evolved Programmable Network Manager
- Cisco Identity Services Engine
- Cisco Meeting Management
- Cisco Nexus 3550-F Switches
- Cisco Nexus Dashboard Fabric Controller
- Cisco Prime Infrastructure
- Cisco Secure Email and Web Manager
- Cisco Secure Email Gateway
- Cisco Secure Web Appliance
- Cisco Unified Communications Manager
- Cisco Unified Communications Manager IM & Presence Service
- Cisco Unified Contact Center Management Portal
- Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point
有关受影响系统的详细资料,请参阅供应商网站的相应安全公告中有关 “Affected Products” 的部分。
影响:
成功利用漏洞可以在受影响的系统导致远端执行程式码、服务被拒绝、权限提升、泄漏资讯、绕过保安限制或仿冒诈骗,视乎攻击者利用哪些漏洞而定。
建议:
适用于受影响系统的修补程式已可获取。受影响系统的系统管理员应遵从供应商的建议,立即採取行动以降低风险。有关修补程式的详细资料,请参阅供应商网站的相应安全公告中有关 “Fixed Software”的部分。
系统管理员可联络其供应商,以取得修补程式及有关支援。
进一步资讯:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3550-acl-bypass-mhskZc2q
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-backhaul-ap-cmdinj-R7E28Ecs
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccmp-sxss-qBTDBZDD
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-info-disc-9ZEMAhGA
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-SVCkMMW
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-Oqb9uFEv
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-yyf2zkXs
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-xss-zYm3f49n
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-inf-disc-cUPKuA5n
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-BBRf7mkE
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vulns-AF544ED5
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mpp-xss-8tAV2TvF
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-sqli-CyPPAxrL
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-infodisc-sbyqQVbG
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20371
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20418
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20445
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20457
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20476
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20484
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20487
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20504
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20507
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20511
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20514
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20525
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20527 (to CVE-2024-20528)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20533 (to CVE-2024-20534)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20536 (to CVE-2024-20540)