Numéro : AV18-027
Date : 7 février 2018
Objet
L'objectif de cet avis est d'attirer l'attention sur un avis de sécurité publié par Cisco.
Évaluation
Cisco a publié un avis de sécurité pour corriger les vulnérabilités dans plusieurs produits.
Produits visés:
- Cisco RV132W ADSL2+ Wireless-N VPN and RV134W VDSL2 Wireless-AC VPN Routers
- Cisco Virtualized Packet Core-Distributed Instance
- Cisco UCS Central
- Cisco Policy Suite RADIUS
- Cisco Unified Communications Manager
- Cisco Spark
- Cisco IOS XR Software
- Cisco IOS and IOS XE Software Diagnostic Shell
- Cisco Firepower System Software BitTorrent File Policy
- Cisco Email Security Appliance and Cisco Content Security Management Appliance Spam Quarantine
- Cisco Data Center Analytics Framework
- Cisco Unified Communications Manager
- Cisco Policy Suite
- Cisco Prime Network
- Cisco StarOS for Cisco ASR 5000 Series Aggregation Services Routers
- Cisco RV132W and RV134W Wireless VPN Routers
Référence CVE: CVE-2018-0125, CVE-2018-0117, CVE-2018-0113, CVE-2018-0116, CVE-2018-0198, CVE-2018-0135, CVE-2018-0119, CVE-2018-0127, CVE-2018-0132, CVE-2018-0123, CVE-2018-0138, CVE-2018-0140, CVE-2018-0129, CVE-2018-0128, CVE-2018-0120, CVE-2018-0134, CVE-2018-0137, CVE-2018-0122
Mesures Recommandées
Le CCRIC recommande que les administrateurs de système mettent à l'essai et déploient les mises à jour diffusées par le fournisseur aux applications concernées.
Références :
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-rv13x
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-vpcdi
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucsc
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cps
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucm1
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucm
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-spark
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-iosxr
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ios
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-fss
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-esacsm
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-dcaf1
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-dcaf
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cucm
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cps1
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-cpn
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-asr
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-rv13x_2