Cisco публикува обновление за подобрение на защитата за отстраняване на уязвимостите в множество продукти на Cisco. Нападател може да използва някои от тези уязвимости, за да поеме контрола върху засегнатата система. За актуализации, насочени към уязвимости с по -ниска тежест, вижте страницата Cisco Security Advisories .
CERT България препоръчва на потребителите и администраторите да прегледат следните препоръки на Cisco и да приложат необходимите актуализации:
- Cisco Application Policy Infrastructure Controller Arbitrary File Read and Write Vulnerability cisco-sa-capic-frw-Nt3RYxR2
- BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021 cisco-sa-qnx-TOxjVPdL
- Cisco NX-OS Software VXLAN OAM (NGOAM) Denial of Service Vulnerability cisco-sa-nxos-ngoam-dos-LTDb9Hv
- Cisco NX-OS Software MPLS OAM Denial of Service Vulnerability cisco-sa-nxos-mpls-oam-dos-sGO9x5GM
- Cisco Nexus 9000 Series Fabric Switches ACI Mode Multi-Pod and Multi-Site TCP Denial of Service Vulnerability cisco-sa-n9kaci-tcp-dos-YXukt6gM
- Cisco Nexus 9000 Series Fabric Switches ACI Mode Queue Wedge Denial of Service Vulnerability cisco-sa-n9kaci-queue-wedge-cLDDEfKF
- Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability cisco-sa-capic-pesc-pkmGK4J
- Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability cisco-sa-capic-chvul-CKfGYBh8
https://tools.cisco.com/security/center/publicationListing.x
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-frw-Nt3RYxR2
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-qnx-TOxjVPdL
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-pesc-pkmGK4J
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8