描述:
Cisco 發布了安全公告,以應對 Cisco 裝置及軟件的多個漏洞。有關漏洞及攻擊向量的資料,請參閱供應商網站的相應安全公告。
受影響的系統:
- Cisco Integrated Management Controller Virtual Keyboard Video Monitor
- Cisco NX-OS Software
- Cisco Nexus Dashboard
- Cisco Nexus Dashboard Fabric Controller
- Cisco Nexus 3000 and 9000 Series Switches
- Cisco UCS Manager Software
有關受影響產品的詳細資料,請參閱供應商網站的相應安全公告中有關 “Affected Products” 的部分。
影響:
成功利用漏洞可以導致受影響的系統發生遠端執行程式碼、服務被拒絕、泄漏資訊或仿冒詐騙,視乎攻擊者利用哪些漏洞而定。
建議:
現已有適用於受影響系統的軟件更新。受影響系統的系統管理員應遵從產品供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software” 的部分。
系統管理員可聯絡其產品支援供應商,以取得修補程式及有關支援。
進一步資訊:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n39k-isis-dos-JhJA8Rfx
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-ptrs-XU2Fm2Wb
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nshs-urapi-gJuBVFpu
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmdinj-qhNze5Ss
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-infodis-TEcTYSFG
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxospc-pim6-vG4jFPh
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-kvmsxss-6h7AnUyk
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-multi-cmdinj-E4Ukjyrz
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-vkvmorv-CnKrV7HK
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-xss-Ey6XhyPS
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20250828
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20262
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20290
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20292
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20294 (to CVE-2025-20296)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20317
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20344
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20347 (to CVE-2025-20348)