描述:
Cisco 发布了安全公告以应对发现于 Cisco 装置及软件中的多个漏洞。有关漏洞及攻击向量的资料,请参阅供应商网站的相应安全公告。
受影响的系统:
- Cisco ConfD
- Cisco Connected Mobile Experiences
- Cisco Evolved Programmable Network Manager
- Cisco Network Services Orchestrator
- Cisco Packet Tracer
- Cisco Small Business RV Series Routers
- Cisco Small Business 100, 300, and 500 Series Wireless Access Points
有关受影响产品的详细资料,请参阅供应商网站的相应安全公告中有关 “Affected Products” 的部分。
影响:
成功利用这些漏洞可以在受影响的系统导致任意插入指令码、执行任意程式码、服务受阻断、泄漏资讯、权限提升、绕过保安限制或完全控制受影响的系统,视乎攻击者利用哪些漏洞而定。
建议:
适用于受影响系统的软件更新已可获取。受影响系统的系统管理员应遵从产品供应商的建议,立即采取行动以降低风险。有关修补程式的详细资料,请参阅供应商网站的相应安全公告中有关 “Fixed Software” 的部分。
系统管理员可联络其产品支援供应商,以取得修补程式及有关支援。
进一步信息:
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20210805
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmx-GkCvfd4
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confd-priv-esc-LsGtCRx4
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-priv-esc-XXqRtTfT
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-packettracer-dll-inj-Qv8Mk5Jx
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-code-execution-9UVJr7k4
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-Mp9FSdG
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1251
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1309
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1522
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1547 (to CVE-2021-1555)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1572
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1593
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1602
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1609
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1610
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34707