Cisco發布了安全公告以應對發現於Cisco產品中運行Cisco IOS及IOS XE的多個漏洞。攻擊者可以通過不同的攻擊向量,例如向受影響的系統傳送特製的封包、請求、通訊模式或規約信息,從而攻擊這些重要漏洞。有關其他漏洞的資料,請參閱供應商網站的相應安全公告。
有關受影響系統的詳細資料,請參閱供應商網站的相應安全公告中有關“Affected Products”的部分。
成功利用這些漏洞可以在受影響的系統導致執行任意程式碼、任意插入指令碼、服務受阻斷、權限提升、泄漏資訊及繞過保安限制。
適用於受影響系統的軟件更新已可獲取。受影響系統的系統管理員應遵從產品供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software” 的部分。
系統管理員可聯絡其產品支援供應商,以取得修補程式及有關支援。
https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74268
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-94ckG4G
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xbace-OnCEbyS
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wpa-dos-cXshjerc
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-auth-bypass-6j2BYUc7
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-splitdns-SPWqpdGW
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rommon-secboot-7JgVLVYC
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-profinet-J9QMCHPB
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mdns-dos-3tH6cA9J
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-le-drTOB625
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-jw2DJmSv
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-fnfv9-EvrAQpNX
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-umbrella-dos-t2QMUX37
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-rsp3-rce-jVHg8Z7c
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-isdn-q931-dos-67eUZBTf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-snmp-dos-wNkedg9K
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-dhcp-dos-JSCKX43h
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lpwa-access-cXsD7PRA
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esp20-arp-dos-GvHVggqJ
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dclass-dos-VKh9D8k3
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confacl-HbPtfSuO
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-ShFzXf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-JP-DOS-g5FfGm8y
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ISR4461-gKKUROhx
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-COPS-VLD-MpbTvGEW
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-unauth-file-access-eBTWkKVW
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-usb-guestshell-WmevScDj
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-iox-app-host-mcZcnsBt
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ctbypass-7QHAfHkK
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cmdinj-2MzhjM6K
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-webui-multi-vfTkk7yr
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lua-rce-7VeJX4f
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-bgp-evpn-dos-LNfYJxfF
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-info-disclosure-V4BmJBNF
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-file-overwrite-Ynu5PrJD
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-icmpv6-qb9eYyCR
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-WEB-UI-exNFmcPO
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3393
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3407 (to CVE-2020-3409)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3416 (to CVE-2020-3418)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3421 (to CVE-2020-3423)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3474 (to CVE-2020-3477)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3486 (to CVE-2020-3489)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3492 (to CVE-2020-3494)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3508 (to CVE-2020-3513)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3527