描述:
Cisco 發布了安全性更新,以應對數個 Cisco 裝置及軟件的多個漏洞。有關漏洞及攻擊向量的資料,請參閱供應商網站的相應安全公告。
有報告指 Cisco 產品 Cisco SD-WAN Software、Cisco Catalyst SD-WAN Controller 及 Cisco Catalyst SD-WAN Manager 的多個權限提升漏洞 (CVE-2022-20775 及 CVE-2026-20127) 正受到攻擊。Cisco 發布了安全性更新,以應對以上問題。系統管理員應立即為受影響的系統安裝修補程式,以減低受到網絡攻擊的風險。
受影響的系統:
- Cisco Application Policy Infrastructure Controller
- Cisco NX-OS Software
- Cisco Catalyst SD-WAN Controller
- Cisco Catalyst SD-WAN Manager
- Cisco FXOS Software
- Cisco UCS Manager Software
- Cisco Nexus 3600 and 9500-R Series Switching Platforms
- Cisco Nexus 9000 Series Fabric Switches in ACI mode
- Cisco SD-WAN Software
有關受影響產品的詳細資料、請參閱供應商網站的相應安全公告中有關 “Affected Products” 的部分。
影響:
成功利用漏洞可以導致受影響的系統發生遠端執行程式碼、服務被拒絕、權限提升、泄漏資訊、繞過保安限制或篡改,視乎攻擊者利用哪些漏洞而定。
建議:
現已有適用於受影響系統的軟件更新。受影響系統的系統管理員應遵從產品供應商的建議,立即採取行動以降低風險。有關修補程式的詳細資料,請參閱供應商網站的相應安全公告中有關 “Fixed Software” 的部分。
系統管理員應聯絡其產品支援供應商,以取得修補程式及有關支援。
進一步資訊:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-dos-rNus8EFw
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n3kn9k_aci_lldp_dos-NdgRrrA3
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cpdos-qLsv6pFD
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dsnmp-cNN39Uh
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ether-dos-Kv8YNWZ4
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsciv-wGYtC78q
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsfxosxss-7skVE8Zv
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsm-afwae-mOgUfyLn
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsm-cmdinj-GvxLPeSB
- https://www.hkcert.org/tc/security-bulletin/cisco-products-multiple-vulnerabilities_20260226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20775
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20818
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20010
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20033
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20036 (to CVE-2026-20037)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20091
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20099
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20107
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20126 (to CVE-2026-20129)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20133