Cisco发布了安全公告以应对发现于Cisco产品中运行Cisco IOS及IOS XE的多个漏洞。攻击者可以通过不同的攻击向量,例如向受影响的系统传送特制的封包、请求、通讯模式或规约信息,从而攻击这些重要漏洞。有关其他漏洞的资料,请参阅供应商网站的相应安全公告。
有关受影响系统的详细资料,请参阅供应商网站的相应安全公告中有关“Affected Products”的部分。
成功利用这些漏洞可以在受影响的系统导致执行任意程式码、任意插入指令码、服务受阻断、权限提升、泄漏资讯及绕过保安限制。
适用于受影响系统的软件更新已可获取。受影响系统的系统管理员应遵从产品供应商的建议,立即采取行动以降低风险。有关修补程式的详细资料,请参阅供应商网站的相应安全公告中有关 “Fixed Software” 的部分。
系统管理员可联络其产品支援供应商,以取得修补程式及有关支援。
https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74268
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-94ckG4G
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xbace-OnCEbyS
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wpa-dos-cXshjerc
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-auth-bypass-6j2BYUc7
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-splitdns-SPWqpdGW
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rommon-secboot-7JgVLVYC
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-profinet-J9QMCHPB
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mdns-dos-3tH6cA9J
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-le-drTOB625
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-jw2DJmSv
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-fnfv9-EvrAQpNX
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-umbrella-dos-t2QMUX37
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-rsp3-rce-jVHg8Z7c
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-isdn-q931-dos-67eUZBTf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-snmp-dos-wNkedg9K
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-dhcp-dos-JSCKX43h
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lpwa-access-cXsD7PRA
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esp20-arp-dos-GvHVggqJ
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dclass-dos-VKh9D8k3
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confacl-HbPtfSuO
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-ShFzXf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-JP-DOS-g5FfGm8y
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ISR4461-gKKUROhx
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-COPS-VLD-MpbTvGEW
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-unauth-file-access-eBTWkKVW
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-usb-guestshell-WmevScDj
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-iox-app-host-mcZcnsBt
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ctbypass-7QHAfHkK
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cmdinj-2MzhjM6K
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-webui-multi-vfTkk7yr
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-lua-rce-7VeJX4f
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-bgp-evpn-dos-LNfYJxfF
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-info-disclosure-V4BmJBNF
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-file-overwrite-Ynu5PrJD
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-icmpv6-qb9eYyCR
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-WEB-UI-exNFmcPO
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3393
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3407 (to CVE-2020-3409)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3416 (to CVE-2020-3418)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3421 (to CVE-2020-3423)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3474 (to CVE-2020-3477)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3486 (to CVE-2020-3489)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3492 (to CVE-2020-3494)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3508 (to CVE-2020-3513)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3527