描述:
Cisco 發布了安全公告以應對發現於 Cisco Application Services Engine、Cisco 運行 NX-OS 的產品、Cisco 運行 FX-OS 的產品及 Cisco Nexus 9000 Series中的多個漏洞。有關漏洞及攻擊向量的資料,請參閱供應商網站的相應安全公告。
受影響的系統:
- Cisco ACI Multi-Site Orchestrator
- Cisco Application Services Engine
- Cisco 運行 NX-OS 的產品
- Cisco 運行 FX-OS 的產品
- Cisco Nexus 9000 Series
有關受影響產品的詳細資料,請參閱供應商網站的相應安全公告中有關“Affected Products”的部分。
影響:
成功利用這些漏洞可以在受影響的系統導致服務受阻斷、繞過保安限制、系統重啓、篡改、未獲認證的服務權限訪問或全面控制受影響系統,視乎攻擊者利用哪些漏洞而定。
建議:
適用於受影響系統的軟件更新已可獲取。受影響系統的系統管理員應遵從產品供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software” 的部分。
系統管理員可聯絡其產品支援供應商,以取得修補程式及有關支援。
進一步資訊:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3000-9000-fileaction-QtLzDRy2
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-case-mvuln-dYrDPC6w
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-nxos-icmpv6-dos-YD55jVCq
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mso-authbyp-bb5GmBQv
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-bgp-De9dPKSK
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-unauth-access-5PWzDx2w
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipv6-netstack-edXPGV7K
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-csrf-wRMzWL9z
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-pim-dos-Y8SjMz4
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-udld-rce-xetH6w35
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1227 (to CVE-2021-1231)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1361
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1367
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1368
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1387
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1388
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1393
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1396