Cisco 發布了7個安全公告,以修復多個Cisco產品中的多個漏洞。遠端攻擊者可以向受影響系統發出特製的SSL連線或惡意封包來攻擊這些漏洞。
成功利用這些漏洞可以導致服務受阻斷或在受影響系統繞過SSL證書確認,視乎攻擊者利用哪個漏洞而定。
適用於受影響系統的修補程式已可獲取。受影響系統的用戶應遵從產品供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software” 的部分。
用戶可聯絡其產品支援供應商,以取得修補程式及有關支援。
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa1
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa2
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa3
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa_inspect
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asaanyconnect
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fp2100
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-fpsnort
https://www.hkcert.org/my_url/zh/alert/18041902
https://www.us-cert.gov/ncas/current-activity/2018/04/18/Cisco-Releases-Security-Updates-Multiple-Products
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0227 (to CVE-2018-2231)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0233
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0240