描述:
Cisco 發布了安全公告以應對發現於 Cisco 裝置及軟件中的多個漏洞。有關漏洞及攻擊向量的資料,請參閱供應商網站的相應安全公告。
受影響的系統:
- Cisco 運行 IOS XR Software 的產品
- Cisco Advanced Malware Protection
- Cisco SD-WAN vManage
- Cisco Small Business RV Series Routers
- Cisco Umbrella (cloud based)
- Cisco Unified Communications Products
- Cisco Unified Intelligence Center Software
- Cisco Webex Meetings
有關受影響產品的詳細資料,請參閱供應商網站的相應安全公告中有關“Affected Products”的部分。
影響:
成功利用這些漏洞可以在受影響的系統導致插入任意指令碼、執行任意程式碼、跨網址程式編程、服務受阻斷、泄漏資訊、繞過保安限制、系統重啓、數據篡改、權限提升或完全控制受影響的系統,視乎攻擊者利用哪些漏洞而定。
建議:
適用於受影響系統的軟件更新已可獲取。受影響系統的系統管理員應遵從產品供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software” 的部分。
系統管理員可聯絡其產品支援供應商,以取得修補程式及有關支援。
進一步資訊:
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20210408
- https://us-cert.cisa.gov/ncas/current-activity/2021/04/08/cisco-releases-security-updates-multiple-products
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-tu79hvkO
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-inf-disc-wCxZNjL2
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-pqVYwyb
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-selfcare-VRWWWHgE
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-Q4PZcNzJ
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuic-xss-U2WTsUg6
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-rce-q3rxHnvm
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv34x-rce-8bfG2h6b
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-bypass-inject-Rbhgvfdx
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-inject-gbZGHP5T
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-VObwRKWV
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-andro-iac-f3UR8frB
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-cmdinj-vsKGherc
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1251
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1309
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1362
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1380
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1386
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1399
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1406 (to CVE-2021-1409)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1413 (to CVE-2021-1415)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1420
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1459
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1463
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1467
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1472 (to CVE-2021-1475)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1479
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1480
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1485