Home
1
Hot News
2
Information Security
3
[Cybersecurity Vulnerability Notice] Cisco4
https://www.kjintelligent.com/en/ KJ Intelligent Corp.
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2025-6543】Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability (CVSS v3.1: 9.8)【是否遭勒索軟體利用:未知】Citrix NetScaler ADC和Gateway存在緩衝區溢位漏洞,可能導致非預期的控制流程改變及阻斷服務。【CVE-2025-48928】TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability (CVSS v3.1:4.0)【是否遭勒索軟體利用:未知】TeleMessage TM SGNL存在核心轉儲檔案暴露於未經授權控制範圍的漏洞。可能透過包含身分驗證資料的記憶體轉儲檔案洩漏敏感資訊。【CVE-2025-48927】TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability (CVSS v3.1: 5.3)【是否遭勒索軟體利用:未知】TeleMessage TM SGNL存在以不安全預設值初始化資源的漏洞。此漏洞與Spring Boot Actuator的設定方式有關,當堆轉儲端點暴露於/heapdump URI時,可能導致安全風險。【CVE-2025-6554】Google Chromium V8 Type Confusion Vulnerability (CVSS v3.1: 8.1)【是否遭勒索軟體利用:未知】Google Chromium V8存在類型混淆漏洞,遠端攻擊者可透過特製的HTML網頁執行任意讀寫。此漏洞可能影響多種使用Chromium的網頁瀏覽器,包括但不限於Google Chrome、Microsoft Edge及Opera。◎建議措施:【CVE-2025-6543】官方已針對漏洞釋出修復更新,請更新至相關版本https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788【CVE-2025-48928】受影響的產品暫無有效緩解措施。建議使用者停止使用相關產品。【CVE-2025-48927】受影響的產品暫無有效緩解措施。建議使用者停止使用相關產品。【CVE-2025-6554】官方已針對漏洞釋出修復更新,請更新至相關版本https://chromereleases.googleblog.com/2025/06/stable-channelupdate-for-desktop_30.html◎相關IOC資訊:◎備註:◎參考資料:【CVE-2025-6543】1.https://nvd.nist.gov/vuln/detail/cve-2025-65432.https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788【CVE-2025-48928】1.https://nvd.nist.gov/vuln/detail/cve-2025-489282.https://www.wired.com/story/hoTLP: CLEAR TWCERT-TWISAC-202507-0019w-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/【CVE-2025-48927】1.https://nvd.nist.gov/vuln/detail/cve-2025-489272.https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/【CVE-2025-6554】1.https://nvd.nist.gov/vuln/detail/cve-2025-65542.https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html https://www.kjintelligent.com/en/hot_519063.html [TWCERT 分享資安情資] CISA新增4個已知遭駭客利用之漏洞至KEV目錄(2025/06/30-2025/07/06) 2025-07-09 2026-07-09
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_519063.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_519063.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2025-07-09 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_519063.html


【雲智維資安預警通知】


漏洞分享 - 思科產品存在多個漏洞

思科產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務、繞過身份驗證、遠端執行程式碼及權限提升,其影響系統或版本如下:
  • Cisco NX-OS Software DHCPv6 Relay Agent Denial of Service Vulnerability
CVE編號:CVE-2024-20446
漏洞描述:Cisco NX-OS的DHCPv6 relay agent存在漏洞,其將允許未經授權之攻擊者透過傳送精心製作的DHCPv6封包到易受影響系統上,並導致阻斷服務。
影響系統/版本:
有啟用DHCP功能的系統皆會自動啟用DHCPv6,故可能會受到影響。
檢查方式:show run all | include "^ipv6 dhcp relay"、show ipv6 interface brief

  • Cisco NX-OS Software Python Sandbox Escape Vulnerabilities
CVE編號:CVE-2024-20284、CVE-2024-20285、CVE-2024-20286
漏洞描述:Cisco NX-OS的Python interpreter存在漏洞,將允許已取得最低權限的攻擊者跳脫python沙箱並進行未經授權之存取行為。
影響系統/版本:
MDS 9000 Series Multilayer Switches
Nexus 3000 Series Switches
Nexus 5500 Platform Switches
Nexus 5600 Platform Switches
Nexus 6000 Series Switches
Nexus 7000 Series Switches
Nexus 9000 Series Switches in standalone NX-OS mode

  • Cisco NX-OS Software Command Injection Vulnerability
CVE編號:CVE-2024-20289
漏洞描述:Cisco NX-OS的CLI存在漏洞,其可能允許已取得最低權限的攻擊者,在易受影響系統上任意執行命令。
影響系統/版本:
Nexus 3000 Series Switches
Nexus 9000 Series Fabric Switches in ACI mode
Nexus 9000 Series Switches in standalone NX-OS mode
UCS 6400 Series Fabric Interconnects
UCS 6500 Series Fabric Interconnects

  • Cisco NX-OS Software Bash Arbitrary Code Execution and Privilege Escalation Vulnerabilities
CVE編號:CVE-2024-20411、CVE-2024-20413
漏洞描述:Cisco NX-OS2存在多個漏洞,其將允許已取得權限的攻擊者存取Bash Shell並且任意執行代碼,以及進行提權。
影響系統/版本:
Nexus 3000 Series Switches
Nexus 9000 Series Switches in standalone NX-OS mode
檢查方式:
show feature | include bash(確定bash是否有啟用)
show running-config | include shelltype(確定使用者是否配置為在登入時使用 Bash shell)

Previous Back to List Next