Home
1
Hot News
2
Information Security
3
[Cybersecurity Vulnerability Notice] Cisco4
https://www.kjintelligent.com/en/ KJ Intelligent Corp.
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】存在風險        Palo Alto 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料、權限提升及繞過身份驗證,其影響系統或版本如下:受影響之系統/漏洞描述:PAN-OS 10.1.14-h16 之前的 PAN-OS 10.1 版本PAN-OS 10.2.17 之前的 PAN-OS 10.2 版本PAN-OS 11.0.3 之前的 PAN-OS 11.0 版本PAN-OS 11.1.10 之前的 PAN-OS 11.1 版本PAN-OS 11.2.7 之前的 PAN-OS 11.2 版本GlobalProtect App 6.3 中 6.3.3-h1 on Windows, macOS 之前的版本GlobalProtect App 6.2 中 6.2.8-h2 on Windows, macOS 之前的版本GlobalProtect App 6.1 on Windows, macOS 所有版本GlobalProtect App 6.0 on Windows, macOS 所有版本建議改善措施:           企業及使用者如有上述漏洞版本應儘速更新: 請將 PAN-OS 10.1.14-h16 之前的 PAN-OS 10.1 版本更新至10.1.14-h16 [ETA: July 2025]或更高版本。請將 PAN-OS 10.2.17 之前的 PAN-OS 10.2 版本更新至11.2.17 [ETA: June 2025]或更高版本。請將 PAN-OS 11.0.3 之前的 PAN-OS 11.0 版本更新至11.0.3或更高版本。請將 PAN-OS 11.1.10 之前的 PAN-OS 11.1 版本更新至11.1.10或更高版本。請將 PAN-OS 11.2.8 之前的 PAN-OS 11.2 版本更新至11.2.8或更高版本。請將 GlobalProtect App 6.3 中 6.3.3-h1 on Windows, macOS 之前的版本更新至6.3.3-h1 (ETA: 12 June, 2025)或更高版本。請將 GlobalProtect App 6.2 中 6.2.8-h2 on Windows, macOS 之前的版本更新至6.2.8-h2 (ETA: June, 2025)或更高版本。請將 GlobalProtect App 6.1 on Windows, macOS 所有版本更新至6.2.8-h2 [ETA June 2025] 或 6.3.3 或更高版本。請將 GlobalProtect App 6.0 on Windows, macOS 所有版本更新至6.2.8-h2 [ETA June 2025] 或 6.3.3 或更高版本       情資報告連結:https://security.paloaltonetworks.com/CVE-2025-4229https://security.paloaltonetworks.com/CVE-2025-4230https://security.paloaltonetworks.com/CVE-2025-4231https://security.paloaltonetworks.com/CVE-2025-4227https://security.paloaltonetworks.com/CVE-2025-4232 https://www.kjintelligent.com/en/hot_517218.html [Cybersecurity Vulnerability Notice] Palo Alto 2025-06-20 2026-06-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_517218.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_517218.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2025-06-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_517218.html



【雲智維資安預警通知】

  • 漏洞分享 - 思科產品存在多個漏洞
    於思科產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料、資料篡改、跨網站指令碼及繞過身份驗證。

受影響之系統/漏洞描述:
  • 1000 Series Integrated Services Routers (ISRs) running a vulnerable release of Cisco IOS XE Software
  • 1000 Series Integrated Services Routers (ISRs) running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • 4000 Series ISRs running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • Catalyst 8000v Edge Software running a vulnerable release of Cisco IOS XE Software
  • Catalyst 8000V Edge Software running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • Catalyst 8200 Series Edge Platforms running a vulnerable release of Cisco IOS XE Software
  • Catalyst 8200 Series Edge Platforms running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • Catalyst 8300 Series Edge Platforms running a vulnerable release of Cisco IOS XE Software
  • Catalyst 8300 Series Edge Platforms running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • Catalyst 8500L Edge Platforms running a vulnerable release of Cisco IOS XE Software
  • Catalyst 8500L Series Edge Platforms running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • Catalyst 9300X Series Switches running a vulnerable release of Cisco IOS XE Software
  • Catalyst 9400X Supervisor Engines running a vulnerable release of Cisco IOS XE Software
  • Catalyst 9500X Series Switches running a vulnerable release of Cisco IOS XE Software
  • Catalyst 9600 Series Switches running a vulnerable release of Cisco IOS XE Software
  • Catalyst 9800 Embedded Wireless Controllers for Catalyst 9300, 9400, and 9500 Series Switches running a vulnerable release of Cisco IOS XE Software
  • Catalyst 9800 Series Wireless Controllers running a vulnerable release of Cisco IOS XE Software
  • Catalyst 9800-CL Wireless Controllers for Cloud running a vulnerable release of Cisco IOS XE Software
  • Catalyst IR8300 Rugged Series Routers running a vulnerable release of Cisco IOS XE Software
  • Catalyst IR8300 Rugged Series Routers running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • Cisco ASR 1000 Series Aggregation Services Routers running Cisco IOS XE Software Release 17.12.1 or 17.12.1a.
  • Cisco Catalyst Center
  • Cisco Catalyst SD-WAN Manager
  • Cisco cBR-8 Converged Broadband Routers running Cisco IOS XE Software Release 17.12.1 or 17.12.1a.
  • Cisco IOS and IOS XE Software
  • Crosswork NSO
  • Embedded Wireless Controllers on Catalyst Access Points running a vulnerable release of Cisco IOS XE Software
  • Industrial Ethernet 4000 Series Switches running Cisco IOS Software Release 15.2(8)E2 or later
  • Industrial Ethernet 4010 Series Switches running Cisco IOS Software Release 15.2(8)E2 or later
  • Industrial Ethernet 5000 Series Switches running Cisco IOS Software Release 15.2(8)E2 or later
  • Optical Site Manager
  • RV340 Dual WAN Gigabit VPN Routers
  • SD-WAN vEdge Cloud Routers
  • SD-WAN vEdge Routers

Previous Back to List Next