轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202511-00000011
[內容說明]
Catalyst Center是Cisco提供的網路管理平台,藉由自動化配置和部署功能,可協助網路管理人員更有效率管理和監控企業網路環境。近日,Cisco發布重大資安漏洞公告(CVE-2025-20341,CVSS:8.8),該漏洞源於使用者輸入資料驗證不足,允許攻擊者可向受影響的系統發送精心設計的HTTP請求,對系統進行未授權的修改。
備註:攻擊者若要使用此漏洞,必須至少具有「Observer」角色的有效憑證。
[影響平台]
● Cisco Catalyst Center 2.3.7.3-VA 至 2.3.7.10-VA(不含)之前版本
[建議措施]
請更新至以下版本: Cisco Catalyst Center 2.3.7.10-VA(含)之後版本
[參考資料]
https://www.twcert.org.tw/tw/cp-169-10507-ed3a8-1.html
Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202511-00000011
[Content Description]
Catalyst Center is a network management platform provided by Cisco. Through automated configuration and deployment capabilities, it helps network administrators manage and monitor enterprise network environments more efficiently. Recently, Cisco released a critical cybersecurity vulnerability announcement (CVE-2025-20341, CVSS: 8.8). This vulnerability stems from insufficient user input validation, allowing attackers to send carefully crafted HTTP requests to affected systems, enabling unauthorized modifications.
Note: Attackers must possess valid credentials for at least the "Observer" role to exploit this vulnerability.
[Affected Platforms]
● Cisco Catalyst Center versions 2.3.7.3-VA to 2.3.7.10-VA (excluding 2.3.7.10-VA) and earlier
[Recommended Action]
Please update to the following version: Cisco Catalyst Center version 2.3.7.10-VA (inclusive) and later
[Reference]
https://www.twcert.org.tw/tw/cp-169-10507-ed3a8-1.html