描述:
Cisco 发布了安全公告,以应对 Cisco 装置及软件的多个漏洞。有关漏洞及攻击向量的资料,请参阅供应商网站的相应安全公告。
有报告指 Cisco IOS 及 IOS XE 软件的服务被拒绝漏洞 (CVE-2025-20352) 正受到攻击。另外,Cisco IOS 及 IOS XE 软件的服务被拒绝漏洞 (CVE-2025-20149) 及仿冒诈骗漏洞 (CVE-2025-20240) 的概念验证 (PoC) 程式码已被公开。Cisco 发布了安全性更新,以应对以上问题。系统管理员应立即为受影响的系统安装修补程式,以减低受到网络攻击的风险。
受影响的系统:
Cisco Access Point Software
Cisco IOS Software
Cisco IOS XE Software
Cisco SD-WAN vEdge Software
影响:
成功利用漏洞可以导致受影响的系统发生远端执行程式码、服务被拒绝、权限提升、泄漏资讯或绕过保安限制,视乎攻击者利用哪些漏洞而定。
建议:
现已有适用于受影响系统的软件更新。受影响系统的系统管理员应遵从产品供应商的建议,立即採取行动以降低风险。有关修补程式的详细资料,请参阅供应商网站的相应安全公告中有关 “Fixed Software” 的部分。
系统管理员可联络其产品支援供应商,以取得修补程式及有关支援。
进一步资讯:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cat9k-acl-L4K7VXgD
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpwred-x3MJyf5M
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-arg-inject-EyDDbh4e
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nbar-dos-LAvwTmeT
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cat9k-PtmD7bgy
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-defaultacl-pSJk9nVF
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ipv6-gw-tUAzpn9O
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-xss-VWyDgjOU
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-9800cl-openscep-SB4xtxzP
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secboot-UqFD8AvC
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-action-frame-inj-QqCNcz8H
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cmd-inject-rPJM8BGL
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-invalid-url-dos-Nvxszf6u
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-tacacs-hdB7thJw
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-cli-EB7cZ6yO
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20250925
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20149
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20160
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20240
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20293
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20311 (to CVE-2025-20316)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20334
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20338 (to CVE-2025-20339)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20352
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20364 (to CVE-2025-20365)