您的瀏覽器似乎不支援JavaScript語法,但沒關係,這裡的JavaScript語法並不會影響 到內容的陳述, 如需要選擇字級大小,IE6請利用鍵盤按住ALT鍵+ V → X → (G)最大 (L)較大(M)中(S)較小(A)小,來選擇適合您的文字大小, 而IE7或Firefox瀏覽器則可 利用鍵盤 Ctrl + (+)放大(-)縮小來改變字型大小,如需要回到上一頁可使用瀏覽器提 供的 Alt+左方向鍵(←) 快速鍵功能,列印可使用瀏覽器提供的(Ctrl+P)功能。 跳到主要內容
News Detail Banner
:::
> NICS > 漏洞新聞

漏洞新聞

1/29至2/4 Kown Exploited Vulnerabilities Catalog(KEV)週報

內容說明:

CISA於1/29至2/4在Kown Exploited Vulnerabilities Catalog(KEV)中發佈2個已遭駭客利用之漏洞。

 

影響平台:

受影響廠商與產品名稱如下:
Ivanti多項產品(Connect Secure、Policy Secure及Neurons)
Apple多項產品(iOS、iPadOS、macOS、tvOS及watchOS)

 

處置建議:

修補說明請參考以下官方連結

Ivanti多項產品(Connect Secure、Policy Secure及Neurons):
https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US

Apple多項產品(iOS、iPadOS、macOS、tvOS及watchOS):
https://support.apple.com/en-us/HT213530
https://support.apple.com/en-us/HT213532
https://support.apple.com/en-us/HT213535
https://support.apple.com/en-us/HT213536
 

CVE編號:

CVE-2022-48618
CVE-2024-21893

 

參考資料:

1. https://www.cisa.gov/known-exploited-vulnerabilities-catalog
2. https://nvd.nist.gov/vuln/detail/CVE-2022-48618
3. https://nvd.nist.gov/vuln/detail/CVE-2024-21893
4. https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
5. https://support.apple.com/en-us/HT213530
6. https://support.apple.com/en-us/HT213532
7. https://support.apple.com/en-us/HT213535
8. https://support.apple.com/en-us/HT213536

Publish Date
2024/2/5 上午 12:00:00