描述:
Cisco 發布了安全公告,以應對 Cisco 裝置及軟件的多個漏洞。有關漏洞及攻擊向量的資料,請參閱供應商網站的相應安全公告。
有報告指 Cisco Adaptive Security Appliance 及 Firepower Threat Defense Software 服務被拒絕漏洞 (CVE-2024-20481) 正受到攻擊。Cisco 發布了安全性更新,以應對以上問題。系統管理員應立即為受影響的系統安裝修補程式,以減低受到網絡攻擊的風險。
受影響的系統:
- Cisco Adaptive Security Appliance Software
- Cisco Adaptive Security Virtual Appliance
- Cisco Firepower Threat Defense Software
- Cisco Secure Client Software
- Cisco Secure Firewall Management Center Software
- Cisco Secure Firewall Threat Defense Virtual
- Snort 2、Snort 3
- Cisco Adaptive Security Appliance Software with Remote Access VPN (RAVPN) service enabled
- Cisco Firepower Threat Defense Software with Remote Access VPN (RAVPN) service enabled
有關受影響系統的詳細資料,請參閱供應商網站的相應安全公告中有關 “Affected Products” 的部分。
影響:
成功利用漏洞可以在受影響的系統導致遠端執行程式碼、服務被拒絕、權限提升、泄漏資訊、繞過保安限制、仿冒詐騙或篡改,視乎攻擊者利用哪些漏洞而定。
建議:
適用於受影響系統的修補程式已可獲取。 受影響系統的系統管理員應遵從供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software”的部分。
系統管理員可聯絡其供應商,以取得修補程式及有關支援。
進一步資訊:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-priv-esc-hBS9gnwq
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssh-dos-eEDWu5RM
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssh-rce-gRAuPEUF
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-tls-CWY6zXB
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-4gYEWMKg
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-cZf8gT
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-vpn-nyH3fhp
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-acl-bypass-VvnLNKqf
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-bf-dos-vDZhLqrW
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dap-dos-bhEkP7n
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-9FgEyHsF
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nsgacl-bypass-77XnEAsL
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-lce-vU3ekMJ3
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-snmp-dos-7TcnzxTU
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-dos-hOnB9pH4
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-yjj7ZjVq
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftdvirtual-dos-MuenGnYR
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csc-dos-XvPhM3bj
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-2HBkA97G
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-g8AOKnDP
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-v3AWDqN7
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-file-read-5q4mQRn
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-nfJeYHxz
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-priv-esc-CMQ4S6m7
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inj-LOYAFcfq
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-inject-2EnmTC8v
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-infodisc-RL4mJFer
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fmc-code-inj-wSHrgz8L
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-geoip-bypass-MB4zRDu
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-statcred-dFC8tXT5
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tls-dos-QXYE5Ufy
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd2100-snort-dos-M9HuMt75
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sa-ftd-snort-fw-BCJTZPMu
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-bypass-PTry37fX
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-rf-bypass-OY8f3pnM
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20063
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20260
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20264
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20268 (to CVE-2024-20269)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20273 (to CVE-2024-20275)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20297 (to CVE-2024-20300)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20329 (to CVE-2024-20331)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20339 (to CVE-2024-20342)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20351
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20364
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20370
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20372
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20374
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20377
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20379
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20382
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20384
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20386 (to CVE-2024-20388)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20402 (to CVE-2024-20403)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20407 (to CVE-2024-20410)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20412
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20415
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20424
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20426
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20431
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20471 (to CVE-2024-20474)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20481 (to CVE-2024-20482)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20485
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20493 (to CVE-2024-20495)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20526
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20241025