描述:
Cisco 發布了安全公告,以應對 Cisco 裝置及軟件中的多個漏洞。有關漏洞及攻擊向量的資料,請參閱供應商網站的相應安全公告。
受影響的系統:
- Cisco Duo Authentication
- Cisco Evolved Programmable Network Manager
- Cisco Identity Services Engine
- Cisco Packet Data Network Gateway
- Cisco Prime Infrastructure
- Cisco Secure Network Analytics
- Cisco Small Business RV016、RV042、RV042G、RV082、RV320 及 RV325 路由器
- Cisco Unified Contact Center Express
受影響的路由器 Cisco Small Business Routers devices 已結束支援,修補程式仍未可獲取,但 Cisco 已提供了臨時解決方法。系統管理員應安排更換已結束支援的產品至受供應商支援的產品型號或轉至其他受支援的技術。
有關受影響產品的詳細資料,請參閱供應商網站的相應安全公告中有關 “Affected Products” 的部分。
影響:
成功利用漏洞可以在受影響的系統導致遠端執行程式碼、插入任意指令碼、服務被拒絕、泄漏資訊、權限提升、繞過保安限制或仿冒詐騙,視乎攻擊者利用哪些漏洞而定。
建議:
受影響系統的系統管理員應遵從產品供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software”的部分。
系統管理員可聯絡其產品支援供應商,以取得修補程式及有關支援。
進一步資訊:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-adeos-MLAyEcvk
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-pdng-dos-KmzwEy2Q
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-replay-knuNKd
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-2XbOg9Dg
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-eRPWAXLe
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-stored-xss-vqz7gC8W
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv01x_rv32x_rce-nzAGWWDD
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv32x-cmdinject-cKQsZpxL
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealth-rce-BDwXFK9C
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealthsmc-rce-sfNBPjcS
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-xss-GO9L9xxr
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20117
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20121 (to CVE-2023-20124)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20127 (to CVE-2023-20131)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20137 (to CVE-2023-20153)