描述:
Cisco 發布了安全公告,以應對 Cisco 裝置及軟件的多個漏洞。有關漏洞及攻擊向量的資料,請參閱供應商網站的相應安全公告。
受影響的系統:
- Cisco 6800、7800、8800、9800 Series Phones
- Cisco Enterprise Chat and Email
- Cisco Evolved Programmable Network Manager
- Cisco Identity Services Engine
- Cisco Meeting Management
- Cisco Nexus 3550-F Switches
- Cisco Nexus Dashboard Fabric Controller
- Cisco Prime Infrastructure
- Cisco Secure Email and Web Manager
- Cisco Secure Email Gateway
- Cisco Secure Web Appliance
- Cisco Unified Communications Manager
- Cisco Unified Communications Manager IM & Presence Service
- Cisco Unified Contact Center Management Portal
- Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point
有關受影響系統的詳細資料,請參閱供應商網站的相應安全公告中有關 “Affected Products” 的部分。
影響:
成功利用漏洞可以在受影響的系統導致遠端執行程式碼、服務被拒絕、權限提升、泄漏資訊、繞過保安限制或仿冒詐騙,視乎攻擊者利用哪些漏洞而定。
建議:
適用於受影響系統的修補程式已可獲取。受影響系統的系統管理員應遵從供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software”的部分。
系統管理員可聯絡其供應商,以取得修補程式及有關支援。
進一步資訊:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3550-acl-bypass-mhskZc2q
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-backhaul-ap-cmdinj-R7E28Ecs
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccmp-sxss-qBTDBZDD
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-info-disc-9ZEMAhGA
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-SVCkMMW
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-Oqb9uFEv
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-yyf2zkXs
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-xss-zYm3f49n
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-inf-disc-cUPKuA5n
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-BBRf7mkE
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vulns-AF544ED5
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mpp-xss-8tAV2TvF
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-sqli-CyPPAxrL
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-infodisc-sbyqQVbG
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20371
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20418
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20445
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20457
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20476
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20484
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20487
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20504
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20507
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20511
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20514
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20525
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20527 (to CVE-2024-20528)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20533 (to CVE-2024-20534)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20536 (to CVE-2024-20540)