Home
1
Hot News
2
Information Security
3
[Cybersecurity Vulnerability Notice] SonicOS4
https://www.kjintelligent.com/en/ KJ Intelligent Corp.
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Apache Tomcat 存在遠端執行程式碼漏洞 Apache Tomcat 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發遠端執行程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Apache Tomcat 11.0.0-M1 至 11.0.2 版本 Apache Tomcat 10.1.0-M1 至 10.1.34 版本 Apache Tomcat 9.0.0.M1 至 9.0.98 版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新或安裝廠商提供之修補程式: https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.3https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.35 https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.99 情資報告連結:https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.3https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.35https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.99 https://www.kjintelligent.com/en/hot_511767.html [Cybersecurity Vulnerability Notice] Apache Tomcat 2025-03-14 2026-03-14
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_511767.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_511767.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2025-03-14 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_511767.html


【雲智維資安預警通知】

  • 漏洞分享 - SonicOS 存在Integer-Based Buffer Overflow漏洞
SonicOS 存在Integer-Based Buffer Overflow漏洞,其將允許遠端攻擊者在特殊情況下透過IPsec利用該漏洞,並造成阻斷服務,以及透過精心製作的IKEv2 payload觸發任意執行代碼,其影響系統或版本如下:

  • 受影響之系統/漏洞描述:
  • Gen6 NSv - NSv10, NSv25, NSv50, NSv100, NSv200, NSv300, NSv400, NSv800, NSv1600
6.5.4.4-44v-21-2395 and older versions
  • Gen7 - TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700, NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSsp 15700, NSv 270, NSv 470, NSv 870
7.0.1-5151 and older versions
7.1.1-7051 and older versions


  • 建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
  1. 請將 Gen6 NSv - NSv10, NSv25, NSv50, NSv100, NSv200, NSv300, NSv400, NSv800, NSv1600 更新至6.5.4.v-21s-RC2457或更高版本。
  2. 請將 Gen7 - TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700,NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSsp 15700, NSv 270, NSv 470, NSv 870之7.0.1-5151(含)以前版本更新至7.0.1-5165或更高版本。
  3. 請將 Gen7 - TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700,NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSsp 15700, NSv 270, NSv 470, NSv 870之7.1.1-7051(含)以前版本更新至7.1.3-7015或更高版本。

情資報告連結:
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0013

Previous Back to List Next