描述:
Cisco 發布了安全公告,以應對 Cisco 裝置及軟件的多個漏洞。有關漏洞及攻擊向量的資料,請參閱供應商網站的相應安全公告。
有報告指 Cisco IOS 及 IOS XE 軟件的服務被拒絕漏洞 (CVE-2025-20352) 正受到攻擊。另外,Cisco IOS 及 IOS XE 軟件的服務被拒絕漏洞 (CVE-2025-20149) 及仿冒詐騙漏洞 (CVE-2025-20240) 的概念驗證 (PoC) 程式碼已被公開。Cisco 發布了安全性更新,以應對以上問題。系統管理員應立即為受影響的系統安裝修補程式,以減低受到網絡攻擊的風險。
受影響的系統:
Cisco Access Point Software
Cisco IOS Software
Cisco IOS XE Software
Cisco SD-WAN vEdge Software
影響:
成功利用漏洞可以導致受影響的系統發生遠端執行程式碼、服務被拒絕、權限提升、泄漏資訊或繞過保安限制,視乎攻擊者利用哪些漏洞而定。
建議:
現已有適用於受影響系統的軟件更新。受影響系統的系統管理員應遵從產品供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software” 的部分。
系統管理員可聯絡其產品支援供應商,以取得修補程式及有關支援。
進一步資訊:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cat9k-acl-L4K7VXgD
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpwred-x3MJyf5M
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-arg-inject-EyDDbh4e
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nbar-dos-LAvwTmeT
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cat9k-PtmD7bgy
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-defaultacl-pSJk9nVF
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ipv6-gw-tUAzpn9O
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-xss-VWyDgjOU
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-9800cl-openscep-SB4xtxzP
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secboot-UqFD8AvC
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-action-frame-inj-QqCNcz8H
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cmd-inject-rPJM8BGL
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-invalid-url-dos-Nvxszf6u
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-tacacs-hdB7thJw
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-cli-EB7cZ6yO
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20250925
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20149
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20160
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20240
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20293
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20311 (to CVE-2025-20316)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20334
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20338 (to CVE-2025-20339)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20352
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20364 (to CVE-2025-20365)