描述:
Cisco 发布了安全公告,以应对 Cisco 装置及软件的多个漏洞。有关漏洞及攻击向量的资料,请参阅供应商网站的相应安全公告。
受影响的系统:
- Cisco IOS Software
- Cisco IOS XE Software
- Cisco Secure Firewall Adaptive Security Appliance Software
- Cisco Secure Firewall Management Center Software
- Cisco Secure Firewall Threat Defense Software
有关受影响产品的详细资料,请参阅供应商网站的相应安全公告中有关 “Affected Products” 的部分。
影响:
成功利用漏洞可以导致受影响的系统发生远端执行程式码、服务被拒绝、绕过保安限制或篡改,视乎攻击者利用哪些漏洞而定。
建议:
现已有适用于受影响系统的软件更新。受影响系统的系统管理员应遵从产品供应商的建议,立即採取行动以降低风险。 有关修补程式的详细资料,请参阅供应商网站的相应安全公告中有关 “Fixed Software” 的部分。
系统管理员可联络其产品支援供应商,以取得修补程式及有关支援。
进一步资讯:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-buffer-overflow-PyRUhWBC
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmdinj-VEhFeZQ3
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dhcp-qj7nGs4N
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-http-file-hUyX2jL4
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nat-dns-dos-bqhynHTM
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssltls-dos-eHw76vZe
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-authz-bypass-M7xhnAu
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-HCRLpFyN
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-ftd-cmdinj-PhE7kmT
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-MqjrZrny
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xpathinj-COrThdMb
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-JtNmcusP
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp2k-IPsec-dos-tjwgdZCO
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-SvKhtjgt
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-ravpn-geobypass-9h38M37Z
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-acl-bypass-mtPze9Yh
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20133 (to CVE-2025-20136)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20148
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20217 (to CVE-2025-20220)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20222
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20224 (to CVE-2025-20225)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20235
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20237 (to CVE-2025-20239)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20243 (to CVE-2025-20244)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20251
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20263
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20265
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20268
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20301 (to CVE-2025-20302)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20306