描述:
Cisco 发布了安全公告,以应对 Cisco 装置及软件的多个漏洞。有关漏洞及攻击向量的资料,请参阅供应商网站的相应安全公告。
受影响的系统:
- Cisco Integrated Management Controller Virtual Keyboard Video Monitor
- Cisco NX-OS Software
- Cisco Nexus Dashboard
- Cisco Nexus Dashboard Fabric Controller
- Cisco Nexus 3000 and 9000 Series Switches
- Cisco UCS Manager Software
有关受影响产品的详细资料,请参阅供应商网站的相应安全公告中有关 “Affected Products” 的部分。
影响:
成功利用漏洞可以导致受影响的系统发生远端执行程式码、服务被拒绝、泄漏资讯或仿冒诈骗,视乎攻击者利用哪些漏洞而定。
建议:
现已有适用于受影响系统的软件更新。受影响系统的系统管理员应遵从产品供应商的建议,立即採取行动以降低风险。有关修补程式的详细资料,请参阅供应商网站的相应安全公告中有关 “Fixed Software” 的部分。
系统管理员可联络其产品支援供应商,以取得修补程式及有关支援。
进一步资讯:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n39k-isis-dos-JhJA8Rfx
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-ptrs-XU2Fm2Wb
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nshs-urapi-gJuBVFpu
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmdinj-qhNze5Ss
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-infodis-TEcTYSFG
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxospc-pim6-vG4jFPh
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-kvmsxss-6h7AnUyk
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-multi-cmdinj-E4Ukjyrz
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-vkvmorv-CnKrV7HK
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-xss-Ey6XhyPS
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20250828
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20262
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20290
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20292
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20294 (to CVE-2025-20296)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20317
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20344
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20347 (to CVE-2025-20348)