【資安漏洞預警】Cisco旗下Catalyst Center存在重大資安漏洞(CVE-2025-20341)
[Security Vulnerability Alert] Cisco's Catalyst Center has a critical cybersecurity vulnerability (CVE-2025-20341).

發布單位:圖資處數位服務組
日期範圍:2025/11/17 ~ 2026/5/17
 
發布單位:圖資處數位服務組
日期範圍:2025/11/17 ~ 2026/5/17
行政 行政公告
全體

轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202511-00000011

[內容說明]
Catalyst Center是Cisco提供的網路管理平台,藉由自動化配置和部署功能,可協助網路管理人員更有效率管理和監控企業網路環境。近日,Cisco發布重大資安漏洞公告(CVE-2025-20341,CVSS:8.8),該漏洞源於使用者輸入資料驗證不足,允許攻擊者可向受影響的系統發送精心設計的HTTP請求,對系統進行未授權的修改。

備註:攻擊者若要使用此漏洞,必須至少具有「Observer」角色的有效憑證。

[影響平台]
● Cisco Catalyst Center 2.3.7.3-VA 至 2.3.7.10-VA(不含)之前版本

[建議措施]
請更新至以下版本: Cisco Catalyst Center 2.3.7.10-VA(含)之後版本

[參考資料]
https://www.twcert.org.tw/tw/cp-169-10507-ed3a8-1.html

Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202511-00000011

[Content Description]
Catalyst Center is a network management platform provided by Cisco. Through automated configuration and deployment capabilities, it helps network administrators manage and monitor enterprise network environments more efficiently. Recently, Cisco released a critical cybersecurity vulnerability announcement (CVE-2025-20341, CVSS: 8.8). This vulnerability stems from insufficient user input validation, allowing attackers to send carefully crafted HTTP requests to affected systems, enabling unauthorized modifications.

Note: Attackers must possess valid credentials for at least the "Observer" role to exploit this vulnerability.

[Affected Platforms]
● Cisco Catalyst Center versions 2.3.7.3-VA to 2.3.7.10-VA (excluding 2.3.7.10-VA) and earlier

[Recommended Action]
Please update to the following version: Cisco Catalyst Center version 2.3.7.10-VA (inclusive) and later

[Reference]
https://www.twcert.org.tw/tw/cp-169-10507-ed3a8-1.html


相關附件
system_update_alt參考資料
Top↑