描述:
Cisco 發布了安全公告,以應對 Cisco 裝置及軟件的多個漏洞。有關漏洞及攻擊向量的資料,請參閱供應商網站的相應安全公告。
有報告指影響 Cisco Secure Email Gateway 及 Cisco Smart Software Manager On-Prem 的多個漏洞 (CVE-2024-20401 及 CVE-2024-20419) 正處於被攻擊的高風險。系統管理員應立即為受影響的系統安裝修補程式,以減低受到網絡攻擊的風險。
受影響的系統:
- Cisco Secure Email Gateway
- Cisco Smart Software Manager On-Prem
- Cisco Expressway Series
- Cisco Identity Services Engine
- Cisco Intelligent Node Software
- Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers
- Cisco Secure Web Appliance
- Cisco Webex App
有關受影響系統的詳細資料,請參閱供應商網站的相應安全公告中有關 “Affected Products” 的部分。
影響:
成功利用漏洞可以在受影響的系統導致遠端執行程式碼、服務被拒絕、泄漏資訊、權限提升或篡改,視乎攻擊者利用哪些漏洞而定。
建議:
適用於受影響系統的修補程式已可獲取。受影響系統的系統管理員應遵從供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software”的部分。
系統管理員可聯絡其供應商,以取得修補程式及有關支援。
進一步資訊:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-auth-sLw3uhUy
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-afw-bGG2UsjH
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-priv-esc-ssti-xNO2EOGZ
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgj
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-inode-static-key-VUVCeynn
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-krW2TxA9
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv34x-rce-7pqFU2e
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-priv-esc-7uHpZsCC
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-ZjNm8X8j
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20240718
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20296
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20323
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20395 (to CVE-2024-20396)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20400 (to CVE-2024-20401)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20416
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20419
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20429
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20435