报告指有高风险的网络攻击正针对存有漏洞的网络装置。用户应立即安装修补程式及加强所有网络装置的保安。对于近期保安警报A18-03-07中提到 Cisco Smart Install (SMI) 漏洞的相关攻击已经被公开,用户亦应优先为这些受影响的装置安装修补程式。
US-CERT、英国国家网路安全中心(NCSC)以及Cisco已分别发布保安警报和建议,就网络基建装置,例如路由器、交换器、防火墙、及网络入侵侦测系统等装置的网络攻击提供资讯。为了降低网络攻击的风险,用户应参考最佳作业实务以保护所有网络装置,包括面向互联网及网络内部的设备。用家尤其应立即采取以下措施:
详情请参考以下的网页(只限英文版本)。
https://www.us-cert.gov/ncas/alerts/TA18-106A
https://www.ncsc.gov.uk/alerts/russian-state-sponsored-cyber-actors-targeting-network-infrastructure-devices
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180416-tsa18-106a
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180416-tsa18-106a
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170214-smi
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0156
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0171