描述:
Cisco 發布了安全公告,以應對 Cisco 裝置及軟件的多個漏洞。有關漏洞及攻擊向量的資料,請參閱供應商網站的相應安全公告。
受影響的系統:
- Cisco IOS Software
- Cisco IOS XE Software
- Cisco Secure Firewall Adaptive Security Appliance Software
- Cisco Secure Firewall Management Center Software
- Cisco Secure Firewall Threat Defense Software
有關受影響產品的詳細資料,請參閱供應商網站的相應安全公告中有關 “Affected Products” 的部分。
影響:
成功利用漏洞可以導致受影響的系統發生遠端執行程式碼、服務被拒絕、繞過保安限制或篡改,視乎攻擊者利用哪些漏洞而定。
建議:
現已有適用於受影響系統的軟件更新。受影響系統的系統管理員應遵從產品供應商的建議,立即採取行動以降低風險。 有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software” 的部分。
系統管理員可聯絡其產品支援供應商,以取得修補程式及有關支援。
進一步資訊:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-buffer-overflow-PyRUhWBC
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmdinj-VEhFeZQ3
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dhcp-qj7nGs4N
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-http-file-hUyX2jL4
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nat-dns-dos-bqhynHTM
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssltls-dos-eHw76vZe
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-authz-bypass-M7xhnAu
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-HCRLpFyN
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-ftd-cmdinj-PhE7kmT
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-MqjrZrny
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xpathinj-COrThdMb
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-JtNmcusP
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp2k-IPsec-dos-tjwgdZCO
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-SvKhtjgt
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-ravpn-geobypass-9h38M37Z
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-acl-bypass-mtPze9Yh
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20133 (to CVE-2025-20136)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20148
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20217 (to CVE-2025-20220)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20222
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20224 (to CVE-2025-20225)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20235
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20237 (to CVE-2025-20239)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20243 (to CVE-2025-20244)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20251
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20263
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20265
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20268
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20301 (to CVE-2025-20302)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20306