描述:
Cisco 發布了安全公告以應對發現於 Cisco 裝置及軟件中的多個漏洞。有關漏洞及攻擊向量的資料,請參閱供應商網站的相應安全公告。
受影響的系統:
- Cisco ASR 900 and ASR 920 Series Aggregation Services Routers
- Cisco Aironet, Catalyst and ESW6300 Series Access Points
- Cisco FXOS Software
- Cisco IOS, IOS XE and IOS XR Software
- Cisco NX-OS Software
- Cisco SD-WAN Software
有關受影響產品的詳細資料,請參閱供應商網站的相應安全公告中有關 “Affected Products” 的部分。
影響:
成功利用這些漏洞可以在受影響的系統導致遠端執行程式碼、插入任意指令碼、服務受阻斷、泄漏資訊、權限提升、繞過保安限制或篡改,視乎攻擊者利用哪些漏洞而定。
建議:
適用於受影響系統的軟件更新已可獲取。受影響系統的系統管理員應遵從產品供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software” 的部分。
系統管理員可聯絡其產品支援供應商,以取得修補程式及有關支援。
進一步資訊:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr900acl-UeEyCxkv
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbr8-cops-Vc2ZsJSx
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbr8snmp-zGjkZ9Fc
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-ap-LLjsGxv
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-capwap-dos-gmNjdKOY
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-capwap-rce-LYgj8Kf
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-gre-6u4ELzAT
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-ipv6-dos-NMYeCnZv
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxo-pattern-bypass-jUXgygYv
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewc-dos-g6JruHRT
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-h323alg-bypass-4vy2MP2Q
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxesdwan-arbfileov-MVOF3ZZn
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxesdwan-privesc-VP4FG3jD
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxesdwan-rbuffover-vE2OB6tp
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxesdwan-clicmdinj-7bYX5k3
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lldp-dos-sBnuHSjT
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-quewedge-69BsHUBW
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ratenat-pYVLA7wM
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-Fhqh8pKX
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-GjR5pGOm
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-credentials-ydYfskzZ
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-jOsuRJCc
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-cmdinjec-znUYTuC
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-privesc-KSUg7QSS
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-trustsec-dos-7fuXDR2
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-pP9jfzwL
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-tguGuYq
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1419
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1546
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1565
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1589
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1611
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1612
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1615
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1616
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1619 (to CVE-2021-1625)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34696
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34697
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34699
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34703
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34705
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34712
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34714
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34723 (to CVE-2021-34727)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34729
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34740
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34767 (to CVE-2021-34770)