首頁
1
最新消息
2
資訊安全
3
[資安漏洞通知] 思科4
http://www.kjintelligent.com/ 科智數位股份有限公司
科智數位股份有限公司 新北市三重區中華路50巷1弄2號
【雲智維資安預警通知】 漏洞分享 - Fortinet 產品存在多個漏洞 Fortinet 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼、洩露敏感資料、繞過身份驗證、篡改及權限提升,其影響系統或版本如下: 受影響之系統/漏洞描述: FortiAnalyzer FortiAnalyzer 6.2 所有版本 FortiAnalyzer 6.4 所有版本 FortiAnalyzer 7.0 所有版本 FortiAnalyzer 7.2 版本 7.2.0 至 7.2.5 FortiAnalyzer 7.4 版本 7.4.0 至 7.4.2 FortiAnalyzer-BigData FortiAnalyzer-BigData 6.2 所有版本 FortiAnalyzer-BigData 6.4 所有版本 FortiAnalyzer-BigData 7.0 所有版本 FortiAnalyzer-BigData 7.2 版本 7.2.0 至 7.2.7 FortiAnalyzer-BigData 7.4 版本 7.4.0 FortiManager FortiManager 6.2 所有版本 FortiManager 6.4 所有版本 FortiManager 7.0 所有版本 FortiManager 7.2 版本 7.2.0 至 7.2.5 FortiManager 7.4 版本 7.4.0 至 7.4.2 FortiOS FortiOS 6.0 所有版本 FortiOS 6.2 所有版本 FortiOS 6.4 所有版本 FortiOS 7.0 所有版本 FortiOS 7.2 版本 7.2.0 至 7.2.8 FortiOS 7.4 版本 7.4.0 至 7.4.3 FortiProxy FortiProxy 1.0 所有版本 FortiProxy 1.1 所有版本 FortiProxy 1.2 所有版本 FortiProxy 2.0 所有版本 FortiProxy 7.0 版本 7.0.0 至 7.0.16 FortiProxy 7.2 版本 7.2.0 至 7.2.9 FortiProxy 7.4 版本 7.4.0 至 7.4.3 FortiClientWindows FortiClientWindows 6.4 所有版本 FortiClientWindows 7.0 版本 7.0.0 至 7.0.12 FortiClientWindows 7.2 版本 7.2.0 至 7.2.4 FortiClientWindows 7.4 版本 7.4.0 FortiClientMac FortiClientMac 6.4 所有版本 FortiClientMac 7.0 版本 7.0.0 至 7.0.10 FortiClientMac 7.2 版本 7.2.0 至 7.2.4 FortiClientMac 7.4 版本 7.4.0 FortiWeb FortiWeb 6.3 所有版本 FortiWeb 7.0 所有版本 FortiWeb 7.2 所有版本 FortiWeb 7.4 版本 7.4.0 至 7.4.3 FortiWeb 7.6 版本 7.6.0 FortiSwitchManager FortiSwitchManager 7.0 版本 7.0.0 至 7.0.3 FortiSwitchManager 7.2 版本 7.2.0 至 7.2.3 FortiPAM FortiPAM 1.0 所有版本 FortiPAM 1.1 所有版本 FortiPAM 1.2 所有版本 FortiPortal FortiPortal 5.3 所有版本 FortiPortal 6.0 版本 6.0.0 至 6.0.14 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://fortiguard.fortinet.com/psirt/FG-IR-23-267https://fortiguard.fortinet.com/psirt/FG-IR-23-396https://fortiguard.fortinet.com/psirt/FG-IR-23-475https://fortiguard.fortinet.com/psirt/FG-IR-24-015https://fortiguard.fortinet.com/psirt/FG-IR-24-022https://fortiguard.fortinet.com/psirt/FG-IR-24-032https://fortiguard.fortinet.com/psirt/FG-IR-24-033https://fortiguard.fortinet.com/psirt/FG-IR-24-098https://fortiguard.fortinet.com/psirt/FG-IR-24-099https://fortiguard.fortinet.com/psirt/FG-IR-24-115https://fortiguard.fortinet.com/psirt/FG-IR-24-116https://fortiguard.fortinet.com/psirt/FG-IR-24-125https://fortiguard.fortinet.com/psirt/FG-IR-24-144https://fortiguard.fortinet.com/psirt/FG-IR-24-179https://fortiguard.fortinet.com/psirt/FG-IR-24-180https://fortiguard.fortinet.com/psirt/FG-IR-24-199https://fortiguard.fortinet.com/psirt/FG-IR-24-205 http://www.kjintelligent.com/hot_503607.html [資安漏洞通知] Fortinet 2024-11-21 2025-11-21
科智數位股份有限公司 新北市三重區中華路50巷1弄2號 http://www.kjintelligent.com/hot_503607.html
科智數位股份有限公司 新北市三重區中華路50巷1弄2號 http://www.kjintelligent.com/hot_503607.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-11-21 http://schema.org/InStock TWD 0 http://www.kjintelligent.com/hot_503607.html



【雲智維資安預警通知】

  • 漏洞分享 - 思科產品存在多個漏洞
    於思科產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料、資料篡改、跨網站指令碼及繞過身份驗證。

受影響之系統/漏洞描述:
  • 1000 Series Integrated Services Routers (ISRs) running a vulnerable release of Cisco IOS XE Software
  • 1000 Series Integrated Services Routers (ISRs) running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • 4000 Series ISRs running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • Catalyst 8000v Edge Software running a vulnerable release of Cisco IOS XE Software
  • Catalyst 8000V Edge Software running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • Catalyst 8200 Series Edge Platforms running a vulnerable release of Cisco IOS XE Software
  • Catalyst 8200 Series Edge Platforms running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • Catalyst 8300 Series Edge Platforms running a vulnerable release of Cisco IOS XE Software
  • Catalyst 8300 Series Edge Platforms running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • Catalyst 8500L Edge Platforms running a vulnerable release of Cisco IOS XE Software
  • Catalyst 8500L Series Edge Platforms running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • Catalyst 9300X Series Switches running a vulnerable release of Cisco IOS XE Software
  • Catalyst 9400X Supervisor Engines running a vulnerable release of Cisco IOS XE Software
  • Catalyst 9500X Series Switches running a vulnerable release of Cisco IOS XE Software
  • Catalyst 9600 Series Switches running a vulnerable release of Cisco IOS XE Software
  • Catalyst 9800 Embedded Wireless Controllers for Catalyst 9300, 9400, and 9500 Series Switches running a vulnerable release of Cisco IOS XE Software
  • Catalyst 9800 Series Wireless Controllers running a vulnerable release of Cisco IOS XE Software
  • Catalyst 9800-CL Wireless Controllers for Cloud running a vulnerable release of Cisco IOS XE Software
  • Catalyst IR8300 Rugged Series Routers running a vulnerable release of Cisco IOS XE Software
  • Catalyst IR8300 Rugged Series Routers running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
  • Cisco ASR 1000 Series Aggregation Services Routers running Cisco IOS XE Software Release 17.12.1 or 17.12.1a.
  • Cisco Catalyst Center
  • Cisco Catalyst SD-WAN Manager
  • Cisco cBR-8 Converged Broadband Routers running Cisco IOS XE Software Release 17.12.1 or 17.12.1a.
  • Cisco IOS and IOS XE Software
  • Crosswork NSO
  • Embedded Wireless Controllers on Catalyst Access Points running a vulnerable release of Cisco IOS XE Software
  • Industrial Ethernet 4000 Series Switches running Cisco IOS Software Release 15.2(8)E2 or later
  • Industrial Ethernet 4010 Series Switches running Cisco IOS Software Release 15.2(8)E2 or later
  • Industrial Ethernet 5000 Series Switches running Cisco IOS Software Release 15.2(8)E2 or later
  • Optical Site Manager
  • RV340 Dual WAN Gigabit VPN Routers
  • SD-WAN vEdge Cloud Routers
  • SD-WAN vEdge Routers

上一個 回列表 下一個