描述:
Cisco 发布了安全公告以应对发现于 Cisco 装置及软件中的多个漏洞。有关漏洞及攻击向量的资料,请参阅供应商网站的相应安全公告。
 
受影响的系统:
- Cisco ConfD
 
- Cisco Connected Mobile Experiences
 
- Cisco Evolved Programmable Network Manager
 
- Cisco Network Services Orchestrator
 
- Cisco Packet Tracer
 
- Cisco Small Business RV Series Routers
 
- Cisco Small Business 100, 300, and 500 Series Wireless Access Points
 
有关受影响产品的详细资料,请参阅供应商网站的相应安全公告中有关 “Affected Products” 的部分。
 
影响:
成功利用这些漏洞可以在受影响的系统导致任意插入指令码、执行任意程式码、服务受阻断、泄漏资讯、权限提升、绕过保安限制或完全控制受影响的系统,视乎攻击者利用哪些漏洞而定。
 
建议:
适用于受影响系统的软件更新已可获取。受影响系统的系统管理员应遵从产品供应商的建议,立即采取行动以降低风险。有关修补程式的详细资料,请参阅供应商网站的相应安全公告中有关 “Fixed Software” 的部分。
系统管理员可联络其产品支援供应商,以取得修补程式及有关支援。
 
进一步信息:
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20210805
 
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmx-GkCvfd4
 
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confd-priv-esc-LsGtCRx4
 
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C
 
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-priv-esc-XXqRtTfT
 
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-packettracer-dll-inj-Qv8Mk5Jx
 
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-code-execution-9UVJr7k4
 
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-multi-lldp-u7e4chCe
 
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy
 
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-Mp9FSdG
 
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1251
 
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1308
 
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1309
 
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1522
 
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1547 (to CVE-2021-1555)
 
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1572
 
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1593
 
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1602
 
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1609
 
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1610
 
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34707