Skip to content

F5 BIG-IP 安全建議公告 – 2026 年 3 月

危急:CVE-2025-53521 已升級為 RCE (CVSS 9.8) – 偵測到活躍攻擊

F5 已確認先前披露的 DoS 漏洞現已演變為 遠端程式碼執行 (RCE) 威脅。所有使用 BIG-IP Access Policy Manager (APM) 的實例必須立即進行修補。

修復建議對照表

受影響版本必備修補版本
17.5.x17.5.1.3 或更高版本
17.1.x17.1.3 或更高版本
16.1.x16.1.6.1 或更高版本
15.1.x15.1.10.8 或更高版本
CISA KEV 狀態: 此漏洞已於 2026 年 3 月 27 日加入已知被利用漏洞目錄。強烈建議聯邦機構與企業立即斷開或修補管理介面。

 

資產識別查詢語句 (runZero)

定位可能受到影響的軟體模組:

vendor:=F5 AND product:=”BIG-IP Access Policy Manager”

定位網路中所有基於 F5 作業系統的設備:

os:=”F5%”

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

安全公告:GNU Inetutils telnetd 危急漏洞

GNU Inetutils telnetd 伺服器發現多項危急漏洞,影響大多數現代 Linux 部署。這些缺陷允許攻擊者在顯示登入提示前,即可繞過身分驗證並執行遠端程式碼 (RCE)。

狀態:目前尚無修補程式。 強烈建議立即在所有受影響的主機上停用 Telnet 服務。

漏洞摘要

漏洞類型編號CVSS 分數受影響版本
SLC 緩衝區溢位尚未指派危急 (Critical)2.7 及更早版本
身分驗證繞過 ($USER 變數)CVE-2026-240619.81.9.3 及更高版本

使用 runZero 進行識別

請在您的資產清單 (Asset Inventory) 中使用以下查詢語句來尋找可能受影響的 Linux 系統:

_asset.protocol:=telnet AND protocol:=telnet AND os:Linux AND banner:=”%login:” AND NOT banner:busybox

建議採取行動

  • 在整個網路中停用 telnetd 服務。
  • 確保實施嚴格的網路存取控制(防火牆)。
  • 將遠端管理工具更換為具備加密功能的 SSH.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

HPE Aruba Networking Security Advisory

Security Advisory: HPE Aruba Networking AOS-CX

HPE has disclosed several vulnerabilities in the AOS-CX network operating system. Successful exploitation could allow adversaries to bypass authentication or execute arbitrary commands on the underlying OS.

CRITICAL NOTICE: CVE-2026-23813 allows unauthenticated remote adversaries to reset the administrator password. Immediate patching is required.

Vulnerability Summary

CVE IDTypeCVSS
CVE-2026-23813Authentication Bypass9.8
CVE-2026-23814CLI Command Injection8.8
CVE-2026-23815Binary Command Injection7.2
CVE-2026-23816OS Command Injection7.2
CVE-2026-23817Open Redirect6.5

Remediation Steps

Update to the following versions or later to resolve these issues:

  • AOS-CX 10.10.xxxx: Upgrade to 10.10.1180
  • AOS-CX 10.13.xxxx: Upgrade to 10.13.1161
  • AOS-CX 10.16.xxxx: Upgrade to 10.16.1030
  • AOS-CX 10.17.xxxx: Upgrade to 10.17.1001

Asset Identification (runZero)

To locate potentially vulnerable systems in your inventory, use the following query:

hw:=”HPE Aruba CX%” AND protocol:http

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Operationalizing CISA KEV for Real-World Risk

The CISA Known Exploited Vulnerabilities (KEV) Catalog is a critical global signal, yet it is often misunderstood as a simple to-do list. To address the challenges of reasoning under uncertainty, we are introducing two new resources designed to help defenders analyze KEV data with the rigor required for modern environments.

KEVology: Analyzing Timelines, Scores, and Exploits

A new report by former CISA Section Chief Tod Beardsley. This analysis investigates how KEV entries behave in practice and identifies the interactions between scoring systems and commodity exploitation that truly matter to defenders.

Read the KEVology Report ➞

KEV Collider: Experimental Threat Signal Analysis

A community-driven web application and open-source dataset. It allows security teams to “smash together” risk signals to explore how different combinations of data change the reality of operational risk.

Launch KEV Collider ➞

The Reality of Prioritization

The KEV is not a definitive list of the most dangerous vulnerabilities; it is an operational tool shaped by specific exploitation criteria. Effective prioritization requires a combination of signals because no single metric provides a complete picture:

  • CVSS: Describes potential severity, but lacks likelihood.
  • EPSS: Models the probability of exploitation, but ignores local exposure.
  • SSVC: Provides a decision-making framework without environmental context.

From Documentation to Active Investigation

Developed by runZero, the KEV Collider enables investigators to layer the CISA KEV with the enrichment data needed to distinguish between theoretical risks and immediate emergencies. This approach allows teams to move toward evidence-based reasoning where prioritization is treated as a hypothesis to be tested and revised.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

CVE-2026-20045: Cisco Unified Communications Manager Vulnerability Guide

Severity: Critical (CVSS 8.2)
Impact: Remote Code Execution (RCE) via arbitrary command injection.
 

Vulnerability Overview

Cisco has officially reported a high-risk vulnerability affecting a wide array of telecommunications and voice management products. This flaw enables an unauthenticated remote attacker to gain administrative control by executing system-level commands on vulnerable hosts.

Affected Products:

  • Cisco Unified Communications Manager (CUCM)
  • CUCM Session Management Edition
  • CUCM IM & Presence Service
  • Cisco Unity Connection
  • Cisco Dedicated Webex Calling Instances

Impact and Scope

Confirmed Vulnerable Versions: 12.5, 14.x, and 15.x.
Note: Legacy versions are also considered potentially vulnerable and should be evaluated immediately.

If successfully exploited, an adversary can execute commands with the privileges of the underlying operating system, potentially leading to unauthorized data access, service disruption, or full network pivot.

Remediation and Patches

Cisco has confirmed that no workarounds are currently available. Security teams must take the following actions:

  • For Version 12.5 and older: Upgrade immediately to a supported, fixed release.
  • For Versions 14.x and 15.x: Apply the specific security patches detailed in the vendor’s official advisory.

Locating Vulnerable Assets with runZero

To identify potentially exposed systems within your environment, navigate to the Software inventory and execute the following search query:

vendor:=Cisco AND product:="Unified Communications Manager"[Insert Query Here]

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×