2024 年 2 月 1 日
[影響平台:]
● Unified Communications Manager (11.5(1), 12.5(1)及14版本)
● Unified Communications Manager IM & Presence Service (11.5(1), 125(1)及14版本)
● Unified Communications Manager Session Management Edition (11.5(1), 12.5(1)及14版本)
● Unified Contact Center Express (12.0(含)以下與12.5(1)版本)
● Unity Connection (11.5(1), 12.5(1)及14版本)
● Virtualized Voice Browser (12.0(含)以下、12.5(1)、12.5(2)、12.6(1)、12.6(2)版本) [建議措施:] 官方已釋出修補,若有使用以上受影響之產品型號,請參考以下官方網址進行確認:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-bWNzQcUm#fs [參考資料:]
1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-bWNzQcUm
2. https://nvd.nist.gov/vuln/detail/CVE-2024-20253
3. https://thehackernews.com/2024/01/critical-cisco-flaw-lets-hackers.html
● Unified Communications Manager (11.5(1), 12.5(1)及14版本)
● Unified Communications Manager IM & Presence Service (11.5(1), 125(1)及14版本)
● Unified Communications Manager Session Management Edition (11.5(1), 12.5(1)及14版本)
● Unified Contact Center Express (12.0(含)以下與12.5(1)版本)
● Unity Connection (11.5(1), 12.5(1)及14版本)
● Virtualized Voice Browser (12.0(含)以下、12.5(1)、12.5(2)、12.6(1)、12.6(2)版本) [建議措施:] 官方已釋出修補,若有使用以上受影響之產品型號,請參考以下官方網址進行確認:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-bWNzQcUm#fs [參考資料:]
1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-bWNzQcUm
2. https://nvd.nist.gov/vuln/detail/CVE-2024-20253
3. https://thehackernews.com/2024/01/critical-cisco-flaw-lets-hackers.html