描述:
Cisco 发布了安全性更新,以应对数个 Cisco 装置及软件的多个漏洞。有关漏洞及攻击向量的资料,请参阅供应商网站的相应安全公告。
有报告指 Cisco 产品 Cisco SD-WAN Software、Cisco Catalyst SD-WAN Controller 及 Cisco Catalyst SD-WAN Manager 的多个权限提升漏洞 (CVE-2022-20775 及 CVE-2026-20127) 正受到攻击。Cisco 发布了安全性更新,以应对以上问题。系统管理员应立即为受影响的系统安装修补程式,以减低受到网络攻击的风险。
受影响的系统:
- Cisco Application Policy Infrastructure Controller
- Cisco NX-OS Software
- Cisco Catalyst SD-WAN Controller
- Cisco Catalyst SD-WAN Manager
- Cisco FXOS Software
- Cisco UCS Manager Software
- Cisco Nexus 3600 and 9500-R Series Switching Platforms
- Cisco Nexus 9000 Series Fabric Switches in ACI mode
- Cisco SD-WAN Software
有关受影响产品的详细资料、请参阅供应商网站的相应安全公告中有关 “Affected Products” 的部分。
影响:
成功利用漏洞可以导致受影响的系统发生远端执行程式码、服务被拒绝、权限提升、泄漏资讯、绕过保安限制或篡改,视乎攻击者利用哪些漏洞而定。
建议:
现已有适用于受影响系统的软件更新。受影响系统的系统管理员应遵从产品供应商的建议,立即採取行动以降低风险。有关修补程式的详细资料,请参阅供应商网站的相应安全公告中有关 “Fixed Software” 的部分。
系统管理员应联络其产品支援供应商,以取得修补程式及有关支援。
进一步资讯:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-dos-rNus8EFw
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n3kn9k_aci_lldp_dos-NdgRrrA3
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cpdos-qLsv6pFD
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dsnmp-cNN39Uh
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ether-dos-Kv8YNWZ4
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsciv-wGYtC78q
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsfxosxss-7skVE8Zv
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsm-afwae-mOgUfyLn
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsm-cmdinj-GvxLPeSB
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20260226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20775
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20818
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20010
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20033
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20036 (to CVE-2026-20037)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20091
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20099
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20107
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20126 (to CVE-2026-20129)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20133