Home
1
Hot News
2
Information Security
3
[Cybersecurity Vulnerability Notice] 思科產品存在多個漏洞4
https://www.kjintelligent.com/en/ KJ Intelligent Corp.
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】Cisco Meeting Management 提供管理員網頁介面,並監控管理視訊會議,包括新增/移除參與者、靜音、變更畫面佈局及啟動錄影等功能。近日Cisco發布重大資安公告(CVE-2026-20098,CVSS:8.8),此為任意檔案上傳漏洞,可能允許經過身分驗證的遠端攻擊者,上傳任意檔案、執行任意命令,並將受影響的系統權限提升至root。備註:若要利用此漏洞,攻擊者至少擁有視訊操作員的有效使用者憑證。◎建議措施:請更新至以下版本:Cisco Meeting Management 3.12.1 MR (含)之後版本◎相關IOC資訊:◎備註:◎參考資料:1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-file-up-kY47n8kK2. https://nvd.nist.gov/vuln/detail/CVE-2026-20098 https://www.kjintelligent.com/en/hot_530443.html [TWCERT 分享資安情資]_Cisco Meeting Management 存在重大資安漏洞(CVE-2026-20098) 2026-02-12 2027-02-12
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_530443.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_530443.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2026-02-12 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_530443.html



【雲智維資安預警通知】
一、摘要
 
        思科產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及繞過身份驗證。




二、存在風險

        思科產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及繞過身份驗證,受影響之系統或技術如下:

受影響之系統/漏洞描述:
Cisco IOS Software
Cisco IOS XE Software
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
Cisco Secure Firewall Threat Defense (FTD) Software


 
三、建議改善措施:

        企業及使用者如有上述漏洞版本應儘速更新。



 
      情資報告連結:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-buffer-overflow-PyRUhWBC
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-acl-bypass-mtPze9Yh
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmdinj-VEhFeZQ3
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dhcp-qj7nGs4N
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-http-file-hUyX2jL4
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nat-dns-dos-bqhynHTM
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssltls-dos-eHw76vZe
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp2k-IPsec-dos-tjwgdZCO

Previous Back to List Next