□ 개요 o Cisco社는 자사의 제품에 영향을 주는 취약점을 해결한 보안 업데이트를 발표 o 공격자는 해당 취약점을 악용하여 XSS 및 정보 노출 등의 피해를 발생시킬 수 있으므로, 최신 버전으로 업데이트 권고
□ 내용 o Cisco FirePOWER System Software에서 발생하는 SSL 로깅 서비스 거부 취약점(CVE-2017-6632) [1] o Cisco Industrial Ethernet 1000 Series Switches Device Manager에서 발생하는 CSRF 취약점(CVE-2017-6634) [2] o Cisco Identity Services Engine GUI에서 발생하는 서비스 거부 취약점(CVE-2017-6653) [3] o Cisco Nexus 5000 Series Switches CLI, Telnet CLI에서 발생하는 커맨드 인젝션 취약점(CVE-2017-6649, 6650) [4][5] o Cisco Prime Collaboration Provisioning에서 직접 객체 참조를 통해 발생하는 인증 우회, 임의 파일 삭제, 정보 노출 취약점 (CVE-2017-6621, 6622, 6635, 6636, 6637) [6][7][8][9][10] o Cisco Remote Expert Manage에서 발생하는 서비스 거부, 정보 노출 취약점(CVE-2017-6641, 6642, 6643, 6644, 6645, 6646, 6647) [11][12][13][14][15][16][17] o Cisco IP Phone 8851 Session Initiation Protocol에서 발생하는 서비스 거부 취약점(CVE-2017-6630) [18] o Cisco Unified Communications Manager Cross에서 발생하는 XSS 취약점(CVE-2017-6654) [19] o Cisco UCS C-Series Rack Servers TCP Port에서 발생하는 서비스 거부 취약점(CVE-2017-6633) [20] o Cisco Policy Suite에서 발생하는 권한 상승 취약점(CVE-2017-6623) [21] o Cisco TelePresence IX5000 Series에서 발생하는 직접 객체 참조 취약점(CVE-2017-6652) [22] □ 해당 시스템 o 영향을 받는 제품 - 참고사이트에 명시되어 있는 ‘Affected Products’을 통해 취약한 제품 확인
□ 해결 방안 o 취약점이 발생한 Cisco 소프트웨어가 설치된 Cisco장비의 운영자는 해당사이트에 명시되어 있는 ‘Affected Products’ 내용을 확인하여 패치 적용 □ 기타 문의사항 o 한국인터넷진흥원 인터넷침해대응센터: 국번없이 118
[참고사이트] [1] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-fpwr [2] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-ie1000csrf [3] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-ise [4] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss [5] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-nss1 [6] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp1 [7] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp2 [8] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp3 [9] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp4 [10] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp5 [11] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem1 [12] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem2 [13] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem3 [14] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem4 [15] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem5 [16] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem6 [17] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem7 [18] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-sip [19] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-ucm [20] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-ucsc [21] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-cps [22] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-telepresence-ix5000 |