Cisco 發布了五個安全公告,以應對發現於 Cisco IOS及IOS XE軟件中的多個漏洞。攻擊者可向受影響裝置傳送特製的DHCP 封包、特製的L2TP 封包、特製的HTTP 參數或發送過量請求來攻擊這些漏洞。
關於受影響產品的詳細資料,請參閱供應商網站相關安全公告中 “Affected Products” 的部分:
01. Cisco IOS 及 IOS XE軟件的DHCP 客戶服務阻斷漏洞
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-dhcpc
02. Cisco IOS 及 IOS XE軟件的第二層隧道協議服務阻斷漏洞
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-l2tp
03. Cisco IOS XE軟件於Cisco ASR 920系列路由器的零接觸配置服務阻斷漏洞
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-ztp
04. Cisco IOS XE軟件的HTTP命令注入漏洞
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-xeci
05. Cisco IOS XE 軟件的網頁用戶界面服務阻斷漏洞
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-webui
成功利用這些漏洞可以導致執行任意程式碼、服務受阻斷、裝置重新啓動或控制受影響的系統,視乎攻擊者利用哪個漏洞而定。
適用於受影響系統的修補程式已可獲取。受影響系統的用戶應遵從產品供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software” 的部分。
https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-60851
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-dhcpc
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-l2tp
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-xeci
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-ztp
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-webui
https://www.us-cert.gov/ncas/current-activity/2017/03/22/Cisco-Releases-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3856 (to CVE-2017-3859)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3864