描述:
Cisco 發布了安全公告,以應對 Cisco 裝置及軟件的多個漏洞。有關漏洞及攻擊向量的資料,請參閱供應商網站的相應安全公告。
受影響的系統:
- Cisco Catalyst 9000 Series Switches
- Cisco Catalyst Center
- Cisco Catalyst SD-WAN Manager
- Cisco Catalyst SD-WAN Routers
- Cisco IOS Software
- Cisco IOS XE Software
- Cisco SD-WAN vEdge Software
- Cisco Unified Threat Defense Snort Intrusion Prevention System Engine
有關受影響系統的詳細資料,請參閱供應商網站的相應安全公告中有關 “Affected Products” 的部分。
影響:
成功利用漏洞可以在受影響的系統導致遠端執行程式碼、服務被拒絕、泄漏資訊、權限提升、繞過保安限制或仿冒詐騙,視乎攻擊者利用哪些漏洞而定。
建議:
適用於受影響系統的修補程式已可獲取。受影響系統的系統管理員應遵從供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software”的部分。
系統管理員可聯絡其供應商,以取得修補程式及有關支援。
進一步資訊:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-cwa-acl-nPSbHSnA
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpp-vfr-dos-nhHKGgO
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ssh-e4uOdASj
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-httpsrvr-dos-yOZThut
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-HfwnRgk
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-MBcbG9k
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pim-APbVfySJ
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-repacl-9eXgnBpD
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rsvp-dos-OypvgVZf
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-vedos-KqFfhps3
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-utd-dos-hDATqxs
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-xss-zQ4KPvYd
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-utd-snort3-dos-bypas-b4OUEwxD
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vlan-dos-27Pur5RT
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-csrf-ycUYxkKO
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20350
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20414
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20433 (to CVE-2024-20434)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20436 (to CVE-2024-20437)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20455
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20464 (to CVE-2024-20465)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20467
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20475
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20480
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20496
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20508
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20510